User Build misconfiguration resulting in local escalation of privilege
CVE-2023-48418
10CRITICAL
Summary
The vulnerability identified within DeviceVersionFragment.java in Pixel Watch allows unauthorized access to Android Debug Bridge (adb) due to an insecure default configuration before the superuser workflow (SUW) is completed. This issue enables a potential local escalation of privileges without necessitating any additional execution rights or user interaction, making the device more susceptible to exploit attempts by malicious actors. This emphasizes the need for timely security updates and proper configuration management to mitigate potential risks.
Affected Version(s)
Pixel Watch Android 11
References
CVSS V3.1
Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database