CVE-2023-21358

7.8 HIGH

📋 TL;DR

This vulnerability allows a malicious Android app to impersonate the system UWB resources component due to improper cryptographic implementation. This enables local privilege escalation without requiring user interaction or additional permissions. Only Android devices with Ultra-Wideband (UWB) hardware running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Android with UWB (Ultra-Wideband) hardware
Versions: Android versions before Android 14 (specifically before 2023-10-01 security patch level)
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with UWB hardware (like Pixel 6 Pro, Pixel 7 Pro, Samsung Galaxy devices with UWB). Devices without UWB hardware are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious app gains system-level privileges, potentially accessing sensitive UWB functionality, intercepting location data, or performing unauthorized device operations.

🟠

Likely Case

Malicious apps could abuse UWB capabilities for unauthorized proximity-based actions or gain elevated permissions for further exploitation.

🟢

If Mitigated

With proper app vetting and security controls, exploitation attempts would be detected and blocked before installation.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring app installation, not directly exploitable over the internet.
🏢 Internal Only: MEDIUM - Malicious apps could be installed through sideloading or compromised app stores, but requires physical or user-assisted device access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires creating a malicious Android app that abuses the cryptographic weakness to impersonate the system UWB resources component.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android 14 (2023-10-01 security patch level or later)

Vendor Advisory: https://source.android.com/docs/security/bulletin/android-14

Restart Required: Yes

Instructions:

1. Update Android device to Android 14 with October 2023 security patches or later. 2. Go to Settings > System > System update. 3. Check for and install available updates. 4. Restart device after installation.

🔧 Temporary Workarounds

Disable UWB functionality

android

Turn off Ultra-Wideband features to remove the vulnerable component

Settings > Connected devices > Connection preferences > Ultra-wideband > Toggle off

Restrict app installations

android

Prevent installation of apps from unknown sources

Settings > Security > Install unknown apps > Disable for all apps

🧯 If You Can't Patch

  • Disable UWB functionality in device settings
  • Implement mobile device management (MDM) to block sideloading and restrict app installations

🔍 How to Verify

Check if Vulnerable:

Check Android version and security patch level: Settings > About phone > Android version. If before Android 14 with October 2023 patches, device is vulnerable if it has UWB hardware.

Check Version:

adb shell getprop ro.build.version.release && adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Confirm device shows Android 14 with security patch level 2023-10-01 or later in Settings > About phone.

📡 Detection & Monitoring

Log Indicators:

  • Package manager logs showing apps requesting UWB permissions
  • Security logs showing privilege escalation attempts

Network Indicators:

  • Unusual UWB communication patterns
  • Apps attempting to use UWB APIs without proper permissions

SIEM Query:

source="android_security" AND (event_type="package_install" AND package_name LIKE "%uwb%") OR (event_type="permission_grant" AND permission LIKE "%UWB%")

🔗 References

📤 Share & Export