First published: Tue Jan 02 2024(Updated: )
In checkDebuggingDisallowed of DeviceVersionFragment.java, there is a possible way to access adb before SUW completion due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation
Credit: dsap-vuln-management@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Google Pixel Watch | ||
Google Pixel Watch | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48418 is classified as a high severity vulnerability due to its potential for local privilege escalation.
To fix CVE-2023-48418, ensure the system is updated to the latest firmware version that addresses this vulnerability.
CVE-2023-48418 affects Google Pixel Watch firmware versions prior to the fix that resolves the insecure default value.
CVE-2023-48418 is a privilege escalation vulnerability that allows unsecured access to adb before system updates are completed.
Exploiting CVE-2023-48418 could lead to unauthorized access and control over the device, resulting in a local escalation of privileges.