The vulnerability allows a low privileged (untrusted) application to
modify a critical system property that should be denied, in order to enable the ADB (Android Debug Bridge) protocol to be exposed on the network, exploiting it to gain a privileged shell on the device without requiring the physical access through USB.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 18 Sep 2024 08:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: bosch

Published:

Updated: 2024-09-17T14:06:24.603Z

Reserved: 2023-10-18T09:35:22.492Z

Link: CVE-2023-43488

cve-icon Vulnrichment

Updated: 2024-08-02T19:44:42.209Z

cve-icon NVD

Status : Modified

Published: 2023-10-25T18:17:31.800

Modified: 2024-11-21T08:24:08.503

Link: CVE-2023-43488

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.