In smp_proc_rand of smp_act.cc, there is a possible authentication bypass during legacy BLE pairing due to incorrect implementation of a protocol. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
Configurations
Configuration 1 (hide)
|
History
21 Jan 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Dec 2024, 18:16
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
First Time |
Google android
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | () https://android.googlesource.com/platform/packages/modules/Bluetooth/+/456f705b9acc78d8184536baff3d21b0bc11c957 - Mailing List, Patch | |
References | () https://source.android.com/security/bulletin/2024-07-01 - Not Applicable | |
CPE | cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* |
Information
Published : 2024-07-09 21:15
Updated : 2025-01-21 23:15
NVD link : CVE-2024-34722
Mitre link : CVE-2024-34722
CVE.ORG link : CVE-2024-34722
JSON object : View
Products Affected
- android
CWE