First published: Tue Sep 05 2023(Updated: )
In gatt_process_prep_write_rsp of gatt_cl.cc, there is a possible privilege escalation due to a use after free. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Google Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-35658 is critical with a severity value of 8.8.
The affected software of CVE-2023-35658 is Google Android versions 11.0, 12.0, 12.1, and 13.0.
No, user interaction is not needed for exploitation of CVE-2023-35658.
CVE-2023-35658 can be exploited through remote (proximal/adjacent) code execution with no additional execution privileges needed.
To fix CVE-2023-35658, it is recommended to apply the necessary security patches provided by Google Android.