CVE-2023-35663

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to read memory beyond intended boundaries in Android's protocolnetadapter component, potentially exposing sensitive information. It affects Android devices, particularly Google Pixel phones, and requires no user interaction or special privileges for exploitation.

💻 Affected Systems

Products:
  • Android
  • Google Pixel devices
Versions: Android versions prior to October 2023 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects protocolnetadapter.cpp component; Pixel devices are confirmed affected per Android security bulletin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote information disclosure leading to exposure of sensitive device memory contents, potentially including authentication tokens, encryption keys, or other protected data.

🟠

Likely Case

Information leakage that could be combined with other vulnerabilities for more complete system compromise, or exposure of device-specific data.

🟢

If Mitigated

No impact if patched; limited impact if network access is restricted and device is isolated.

🌐 Internet-Facing: HIGH - Remote exploitation possible without authentication or user interaction.
🏢 Internal Only: MEDIUM - Still exploitable from internal networks but requires network access to vulnerable device.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

No authentication required and no user interaction needed, but exploitation requires understanding of memory layout and protocol handling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: October 2023 Android security patch level or later

Vendor Advisory: https://source.android.com/security/bulletin/pixel/2023-10-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > System update. 2. Install October 2023 or later security patch. 3. Reboot device after installation.

🔧 Temporary Workarounds

Network segmentation

all

Restrict network access to affected devices to minimize attack surface

Disable unnecessary services

android

Disable network services that use protocolnetadapter if not required

🧯 If You Can't Patch

  • Isolate affected devices from untrusted networks
  • Implement strict network access controls and monitor for unusual outbound connections

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version > Security patch level

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level is October 2023 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual memory access patterns in system logs
  • Crashes or abnormal behavior in network services

Network Indicators:

  • Unexpected network traffic to/from Android devices on unusual ports
  • Protocol anomalies in network communications

SIEM Query:

source="android_system_logs" AND (event_description="memory access violation" OR event_description="out of bounds read")

🔗 References

📤 Share & Export