First published: Thu May 04 2023(Updated: )
Improper input validation vulnerability in setPartnerTAInfo in mPOS TUI trustlet prior to SMR May-2023 Release 1 allows local attackers to overwrite the trustlet memory.
Credit: mobile.security@samsung.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Android | =13.0 | |
Samsung Android | =13.0-smr-apr-2023-r1 | |
Samsung Android | =13.0-smr-dec-2022-r1 | |
Samsung Android | =13.0-smr-feb-2023-r1 | |
Samsung Android | =13.0-smr-jan-2023-r1 | |
Samsung Android | =13.0-smr-mar-2023-r1 | |
Samsung Android | =13.0-smr-nov-2022-r1 | |
Samsung Android | =13.0-smr-oct-2022-r1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-21498 has been classified as a high severity vulnerability due to the potential for local attackers to overwrite trustlet memory.
To fix CVE-2023-21498, update to the latest Samsung Android security patch released in May 2023 or later.
CVE-2023-21498 affects multiple versions of Samsung Android 13.0, including specific security maintenance releases from late 2022 to May 2023.
CVE-2023-21498 can be exploited by local attackers to overwrite trustlet memory, potentially leading to privilege escalation.
Currently, there is no known workaround for CVE-2023-21498, making it essential to apply the available security updates.