First published: Mon Mar 04 2024(Updated: )
In access_secure_service_from_temp_bond of btm_sec.cc, there is a possible way to achieve keystroke injection due to improper input validation. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 | |
Android | =14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-23717 is classified as a high severity vulnerability due to the potential for privilege escalation.
To mitigate CVE-2024-23717, update your Android device to the latest available version that includes the security patches.
CVE-2024-23717 affects Google Android versions 12.0, 12.1, 13.0, and 14.0.
CVE-2024-23717 enables keystroke injection attacks that could lead to local privilege escalation.
No, exploiting CVE-2024-23717 does not require user interaction.