#VU63350 Security features bypass in Pixel


Vulnerability identifier: #VU63350

Vulnerability risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-39713

CWE-ID: CWE-254

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Pixel
Mobile applications / Mobile firmware & hardware

Vendor:

Description

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to multiple issues in Qdisc implementation related to rcu read lock. A local application can execute arbitrary code with elevated privileges.

Mitigation
Install updates from vendor's website.

Vulnerable software versions


External links
http://source.android.com/security/bulletin/pixel/2022-03-01
http://android.googlesource.com/kernel/common/+/9d7e82cec35c0
http://android.googlesource.com/kernel/common/+/3a7d0d07a3867
http://android.googlesource.com/kernel/common/+/86bd446b5cebd
http://android.googlesource.com/kernel/common/+/6f99528e97977
http://android.googlesource.com/kernel/common/+/e368fdb61d8e7


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability