First published: Mon Jul 01 2024(Updated: )
In smp_proc_rand of smp_act.cc, there is a possible authentication bypass during legacy BLE pairing due to incorrect implementation of a protocol. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Google Android | =14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34722 has a high severity rating due to the potential for remote escalation of privilege without user interaction.
To fix CVE-2024-34722, update your Android device to the latest security patch provided by Google.
CVE-2024-34722 affects users of Google Android versions 12.0, 12.1, 13.0, and 14.0.
CVE-2024-34722 is an authentication bypass vulnerability that occurs during legacy Bluetooth Low Energy pairing.
No, user interaction is not needed for exploitation of CVE-2024-34722, making it particularly concerning.