Impact
The flaw is an out‑of‑bounds write in the ns_GetUserData function of Android’s ns_SmscbUtilities.c module. The incorrect bounds check allows an attacker to corrupt memory, which in turn can be used to elevate privileges on the device. The vulnerability does not require any user interaction or the execution of additional code—an unprivileged attacker can trigger it directly through crafted SMS messages or other input channels, potentially compromising the entire system.
Affected Systems
The vulnerability affects Google Android devices. No specific build or version numbers are listed, so all releases from the affected family are potentially impacted until a patch is applied.
Risk and Exploitability
With a CVSS score of 9.8, the technical severity is extremely high. The EPSS score of less than 1% suggests a low probability of exploitation at this time, and the vulnerability is not yet in CISA’s KEV catalog. The description indicates the flaw could be triggered remotely and requires no user consent; the specific attack vector (such as SMS) is inferred rather than explicitly documented, but it suggests that an attacker could potentially deliver the exploit via SMS or similar input channels. If exploitation succeeds, the impact on confidentiality, integrity, and availability is substantial.
OpenCVE Enrichment