CVE-2021-0586

7.8 HIGH

📋 TL;DR

This CVE describes a tapjacking vulnerability in Android's Bluetooth device picker interface. Attackers can overlay malicious UI elements to trick users into selecting unintended Bluetooth devices, potentially leading to local privilege escalation. Affected users include anyone running vulnerable Android versions who uses Bluetooth device pairing.

💻 Affected Systems

Products:
  • Android
Versions: Android 8.1, 9, 10, and 11
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected Android versions with Bluetooth enabled are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains elevated privileges on the device, potentially accessing sensitive data or installing malware without user knowledge.

🟠

Likely Case

User inadvertently pairs with a malicious Bluetooth device, enabling data interception or unauthorized access to device functions.

🟢

If Mitigated

With proper security controls and user awareness, the risk is limited to temporary inconvenience or failed pairing attempts.

🌐 Internet-Facing: LOW - This is a local attack requiring physical or proximity access to the device.
🏢 Internal Only: MEDIUM - Within an organization, malicious insiders or compromised devices could exploit this against other devices in proximity.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (tapping on a malicious overlay) and physical/proximity access to the target device.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Bulletin July 2021 patches

Vendor Advisory: https://source.android.com/security/bulletin/2021-07-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > Advanced > System update. 2. Install the July 2021 Android security patch. 3. Reboot the device after installation.

🔧 Temporary Workarounds

Disable Bluetooth when not in use

android

Turn off Bluetooth to prevent the device picker interface from being accessible to attackers.

Settings > Connected devices > Connection preferences > Bluetooth > Toggle off

Enable 'Draw over other apps' protection

android

Restrict which apps can draw over other apps to prevent overlay attacks.

Settings > Apps & notifications > Special app access > Display over other apps > Restrict unnecessary apps

🧯 If You Can't Patch

  • Disable Bluetooth completely in device settings
  • Educate users to be cautious when pairing Bluetooth devices and verify device names carefully

🔍 How to Verify

Check if Vulnerable:

Check Android version in Settings > About phone > Android version. If version is 8.1, 9, 10, or 11 without July 2021 security patches, device is vulnerable.

Check Version:

Settings > About phone > Android version

Verify Fix Applied:

Check security patch level in Settings > About phone > Android security patch level. Verify it shows 'July 5, 2021' or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Bluetooth pairing events
  • Multiple failed pairing attempts from unknown devices

Network Indicators:

  • Unexpected Bluetooth connections from unfamiliar MAC addresses

SIEM Query:

Search for Bluetooth pairing events with suspicious device names or from unknown MAC addresses in device logs.

🔗 References

📤 Share & Export