CVE-2023-4164

8.4 HIGH

📋 TL;DR

CVE-2023-4164 is an information disclosure vulnerability in Pixel Watch health data components where missing permission checks allow unauthorized access to sensitive health information. This affects Pixel Watch devices running vulnerable Android versions. Attackers can exploit this locally without requiring elevated privileges.

💻 Affected Systems

Products:
  • Google Pixel Watch
Versions: Android versions prior to December 2023 security patch
Operating Systems: Android (Pixel Watch specific)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Pixel Watch devices; other Android devices or Wear OS watches are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all health data stored on the device including heart rate, activity tracking, sleep patterns, and other biometric information to malicious local applications.

🟠

Likely Case

Malicious apps installed on the device can silently collect and exfiltrate health data without user knowledge or consent.

🟢

If Mitigated

With proper app sandboxing and security updates, only authorized health apps can access sensitive data as intended.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring physical access or malicious app installation on the device.
🏢 Internal Only: HIGH - Any malicious app or user with physical access to the device can exploit this vulnerability to access sensitive health data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and app installation, but the vulnerability itself is simple to trigger once an app is installed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: December 2023 security patch (2023-12-01)

Vendor Advisory: https://source.android.com/docs/security/bulletin/pixel-watch/2023/2023-12-01

Restart Required: Yes

Instructions:

1. Open Settings on Pixel Watch. 2. Navigate to System > System updates. 3. Check for and install the December 2023 security update. 4. Restart the watch when prompted.

🔧 Temporary Workarounds

Restrict app installations

all

Only install apps from trusted sources and review app permissions carefully.

Disable unnecessary health data access

all

Review and revoke health data permissions for non-essential apps in Settings.

🧯 If You Can't Patch

  • Limit physical access to the device and monitor for suspicious apps
  • Consider temporarily disabling health tracking features if sensitive data is at risk

🔍 How to Verify

Check if Vulnerable:

Check if Pixel Watch is running a security patch level older than December 2023 (2023-12-01).

Check Version:

Settings > System > About > Versions > Android security patch level

Verify Fix Applied:

Verify the security patch level shows December 2023 (2023-12-01) or later in Settings > System > About > Versions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual health data access patterns from non-health apps
  • Permission violation logs in system logs

Network Indicators:

  • Unexpected health data exfiltration from watch to external servers

SIEM Query:

Not applicable for typical watch deployments; monitor for abnormal health API calls if enterprise MDM is used.

🔗 References

📤 Share & Export