First published: Wed Jan 08 2025(Updated: )
In DevmemIntMapPages of devicemem_server.c, there is a possible physical page uaf due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35685 has a medium severity rating due to its potential for local escalation of privilege.
To fix CVE-2023-35685, users should update their affected Android devices to the latest security patches provided by Google.
CVE-2023-35685 affects devices running certain versions of Android that utilize the specific faulty logic in the devicemem_server.c code.
If exploited, CVE-2023-35685 could allow an attacker to escalate privileges on the kernel without needing additional execution privileges.
No, user interaction is not required for the exploitation of CVE-2023-35685.