CVE-2023-45775
📋 TL;DR
This vulnerability in Android's Bluetooth stack allows local attackers to escalate privileges without user interaction. An out-of-bounds write in the CreateAudioBroadcast function enables arbitrary code execution. Affects Android devices with vulnerable Bluetooth implementations.
💻 Affected Systems
- Android
📦 What is this software?
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attacker to execute arbitrary code with system privileges, potentially installing persistent malware or accessing sensitive data.
Likely Case
Local privilege escalation allowing attacker to gain elevated permissions, potentially accessing other apps' data or system resources.
If Mitigated
Limited impact if device is patched or Bluetooth is disabled; sandboxing may contain some damage.
🎯 Exploit Status
Requires local access to device; no user interaction needed but attacker needs ability to execute code on device.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: December 2023 Android Security Patch or later
Vendor Advisory: https://source.android.com/security/bulletin/2023-12-01
Restart Required: Yes
Instructions:
1. Check for system updates in Settings > System > System update. 2. Install December 2023 or later security patch. 3. Reboot device after installation.
🔧 Temporary Workarounds
Disable Bluetooth
androidTurn off Bluetooth functionality to prevent exploitation
adb shell settings put global bluetooth_on 0
Settings > Connected devices > Connection preferences > Bluetooth > Turn off
🧯 If You Can't Patch
- Disable Bluetooth when not in use
- Restrict installation of untrusted applications
🔍 How to Verify
Check if Vulnerable:
Check Android security patch level: Settings > About phone > Android version > Build number. If before December 2023, likely vulnerable.
Check Version:
adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify security patch level shows December 2023 or later date.
📡 Detection & Monitoring
Log Indicators:
- Unusual Bluetooth stack crashes
- Privilege escalation attempts in system logs
- Suspicious process creation from Bluetooth services
Network Indicators:
- None - local exploitation only
SIEM Query:
source="android_system" AND (event="bluetooth_crash" OR process="com.android.bluetooth" AND action="privilege_escalation")
🔗 References
- https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8e3b3fc918b3ea77754c6d82ab0f09cce81e145b
- https://source.android.com/security/bulletin/2023-12-01
- https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8e3b3fc918b3ea77754c6d82ab0f09cce81e145b
- https://source.android.com/security/bulletin/2023-12-01