CVE-2023-43488

7.9 HIGH

📋 TL;DR

This vulnerability allows low-privileged applications to modify critical system properties to enable ADB over network, potentially granting attackers privileged shell access without physical USB connection. Affects Bosch BMA4xx series sensors and potentially other Android-based systems where ADB debugging is available.

💻 Affected Systems

Products:
  • Bosch BMA4xx series sensors (BMA423, BMA456, etc.)
Versions: Firmware versions prior to the fix
Operating Systems: Android-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires ADB debugging capability to be present on the device. May affect other Android-based IoT devices with similar configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain root/privileged shell access on affected devices, enabling complete system compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Local privilege escalation allowing malicious apps to gain elevated permissions and access sensitive system resources.

🟢

If Mitigated

Limited impact if ADB debugging is disabled and proper app sandboxing is enforced.

🌐 Internet-Facing: MEDIUM - Requires network-accessible ADB port, but if enabled could allow remote exploitation.
🏢 Internal Only: HIGH - Local malicious apps can exploit this without network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local app installation or execution. Exploitation involves modifying system properties to enable ADB over network.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Bosch security advisory for specific patched versions

Vendor Advisory: https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html

Restart Required: Yes

Instructions:

1. Check Bosch security advisory for affected products. 2. Apply firmware updates from Bosch. 3. Restart devices after update. 4. Verify ADB debugging is disabled in production.

🔧 Temporary Workarounds

Disable ADB debugging

android

Disable Android Debug Bridge functionality in production environments

adb shell settings put global adb_enabled 0
adb shell setprop persist.adb.tcp.port -1

Restrict app permissions

all

Implement strict app sandboxing and permission controls

🧯 If You Can't Patch

  • Disable ADB debugging completely in production devices
  • Implement network segmentation to isolate affected devices from critical networks

🔍 How to Verify

Check if Vulnerable:

Check if ADB can be enabled via system property modification by low-privileged apps. Test with: adb shell getprop | grep adb

Check Version:

adb shell getprop ro.build.version.incremental

Verify Fix Applied:

Verify ADB cannot be enabled via property modification and check firmware version against patched versions.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected ADB service activation
  • System property modification attempts for adb.* properties
  • Privilege escalation attempts

Network Indicators:

  • Unexpected ADB port (5555) opening on network
  • ADB protocol traffic from unauthorized sources

SIEM Query:

source="android" AND (event="property_set" AND property LIKE "adb_%") OR (event="service_start" AND service="adbd")

🔗 References

📤 Share & Export