ID

VAR-202303-2176


CVE

CVE-2023-20991


TITLE

Google  of  Android  Out-of-bounds read vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2023-006101

DESCRIPTION

In btm_ble_process_periodic_adv_sync_lost_evt of ble_scanner_hci_interface.cc , there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-255305114. Google of Android Exists in an out-of-bounds read vulnerability.Information may be obtained. Google Pixel is a smart phone of Google (Google). Google Pixel has a buffer overflow vulnerability. The vulnerability is caused by a boundary error in data processing in btm_ble_process_periodic_adv_sync_lost_evt of ble_scanner_hci_interface.cc. Attackers can exploit this vulnerability to cause information disclosure

Trust: 2.25

sources: NVD: CVE-2023-20991 // JVNDB: JVNDB-2023-006101 // CNVD: CNVD-2023-23818 // VULMON: CVE-2023-20991

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2023-23818

AFFECTED PRODUCTS

vendor:googlemodel:androidscope:eqversion:13.0

Trust: 1.8

vendor:googlemodel:androidscope:eqversion: -

Trust: 0.8

vendor:googlemodel:androidscope: - version: -

Trust: 0.8

vendor:googlemodel:pixelscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2023-23818 // JVNDB: JVNDB-2023-006101 // NVD: CVE-2023-20991

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-20991
value: MEDIUM

Trust: 1.0

NVD: CVE-2023-20991
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2023-23818
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202303-2041
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2023-23818
severity: MEDIUM
baseScore: 4.3
vectorString: AV:L/AC:L/AU:M/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-20991
baseSeverity: MEDIUM
baseScore: 4.4
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 0.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2023-20991
baseSeverity: MEDIUM
baseScore: 4.4
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2023-23818 // JVNDB: JVNDB-2023-006101 // CNNVD: CNNVD-202303-2041 // NVD: CVE-2023-20991

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.0

problemtype:Out-of-bounds read (CWE-125) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-006101 // NVD: CVE-2023-20991

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202303-2041

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202303-2041

PATCH

title:Patch for Google Pixel ble_scanner_hci_interface.cc file buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/416906

Trust: 0.6

title:Google Pixel Buffer error vulnerability fixurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=231330

Trust: 0.6

sources: CNVD: CNVD-2023-23818 // CNNVD: CNNVD-202303-2041

EXTERNAL IDS

db:NVDid:CVE-2023-20991

Trust: 3.9

db:JVNDBid:JVNDB-2023-006101

Trust: 0.8

db:CNVDid:CNVD-2023-23818

Trust: 0.6

db:CNNVDid:CNNVD-202303-2041

Trust: 0.6

db:VULMONid:CVE-2023-20991

Trust: 0.1

sources: CNVD: CNVD-2023-23818 // VULMON: CVE-2023-20991 // JVNDB: JVNDB-2023-006101 // CNNVD: CNNVD-202303-2041 // NVD: CVE-2023-20991

REFERENCES

url:https://source.android.com/security/bulletin/pixel/2023-06-01

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2023-20991

Trust: 1.4

url:https://source.android.com/security/bulletin/pixel/2023-03-01

Trust: 0.7

url:https://cxsecurity.com/cveshow/cve-2023-20991/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2023-23818 // VULMON: CVE-2023-20991 // JVNDB: JVNDB-2023-006101 // CNNVD: CNNVD-202303-2041 // NVD: CVE-2023-20991

SOURCES

db:CNVDid:CNVD-2023-23818
db:VULMONid:CVE-2023-20991
db:JVNDBid:JVNDB-2023-006101
db:CNNVDid:CNNVD-202303-2041
db:NVDid:CVE-2023-20991

LAST UPDATE DATE

2024-08-14T14:54:51.030000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2023-23818date:2023-04-04T00:00:00
db:VULMONid:CVE-2023-20991date:2023-03-24T00:00:00
db:JVNDBid:JVNDB-2023-006101date:2023-11-13T03:08:00
db:CNNVDid:CNNVD-202303-2041date:2023-06-29T00:00:00
db:NVDid:CVE-2023-20991date:2023-06-28T18:15:13.057

SOURCES RELEASE DATE

db:CNVDid:CNVD-2023-23818date:2023-04-03T00:00:00
db:VULMONid:CVE-2023-20991date:2023-03-24T00:00:00
db:JVNDBid:JVNDB-2023-006101date:2023-11-13T00:00:00
db:CNNVDid:CNNVD-202303-2041date:2023-03-24T00:00:00
db:NVDid:CVE-2023-20991date:2023-03-24T20:15:12.027