First published: Thu May 04 2023(Updated: )
Double free validation vulnerability in setPinPadImages in mPOS TUI trustlet prior to SMR May-2023 Release 1 allows local attackers to access the trustlet memory.
Credit: mobile.security@samsung.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Android | =13.0 | |
Samsung Android | =13.0-smr-apr-2023-r1 | |
Samsung Android | =13.0-smr-dec-2022-r1 | |
Samsung Android | =13.0-smr-feb-2023-r1 | |
Samsung Android | =13.0-smr-jan-2023-r1 | |
Samsung Android | =13.0-smr-mar-2023-r1 | |
Samsung Android | =13.0-smr-nov-2022-r1 | |
Samsung Android | =13.0-smr-oct-2022-r1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-21500 is classified as a vulnerability that allows local attackers to access trustlet memory, indicating a significant security risk.
To fix CVE-2023-21500, ensure you apply the security updates released in the May-2023 SMR for Samsung Android.
CVE-2023-21500 affects Samsung Android versions 13.0 and various SMR versions from late 2022 to early 2023.
A double free validation vulnerability occurs when a program incorrectly frees a memory location twice, leading to potential memory corruption or unauthorized access.
CVE-2023-21500 is a local vulnerability, meaning it requires local access to the affected device to be exploited.