User Build misconfiguration resulting in local escalation of privilege
CVE-2023-48418

7.8HIGH

Key Information:

Vendor
Google
Vendor
CVE Published:
2 January 2024

Summary

The vulnerability identified within DeviceVersionFragment.java in Pixel Watch allows unauthorized access to Android Debug Bridge (adb) due to an insecure default configuration before the superuser workflow (SUW) is completed. This issue enables a potential local escalation of privileges without necessitating any additional execution rights or user interaction, making the device more susceptible to exploit attempts by malicious actors. This emphasizes the need for timely security updates and proper configuration management to mitigate potential risks.

Affected Version(s)

Pixel Watch Android 11

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.