CVE-2017-13256:
Out-of-bounds write vulnerability in Android's Bluetooth SDP server allowing remote code execution
Score
A numerical rating that indicates how dangerous this vulnerability is.
8.8High- Published Date:Apr 4, 2018
- CISA KEV Date:*No Data*
- Industries Affected:20
Threat Predictions
- EPSS Score:0.3
- EPSS Percentile:52%
Exploitability
- Score:2.8
- Attack Vector:ADJACENT_NETWORK
- Attack Complexity:LOW
- Privileges Required:NONE
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:5.9
- Confidentiality Impact:HIGH
- Integrity Impact:HIGH
- Availability Impact:HIGH
Description Preview
Out-of-bounds write vulnerability in Android's Bluetooth SDP server allowing remote code execution
Overview
This vulnerability (CWE-787: Out-of-bounds Write) affects the Bluetooth stack in Android devices. The flaw exists in the Service Discovery Protocol (SDP) server implementation, which is responsible for handling service discovery requests from other Bluetooth devices. When processing service search attribute requests, the code fails to properly validate input boundaries, allowing an attacker to write data beyond allocated memory buffers. An attacker within Bluetooth range of a vulnerable device can exploit this vulnerability to execute arbitrary code with the privileges of the Bluetooth service. Since the Bluetooth service typically runs with elevated privileges, this could lead to complete device compromise. The attack doesn't require any user interaction or authentication, making it particularly dangerous.
Remediation
- To address this vulnerability, users should:
- 1. Update devices to the latest Android security patch level that includes fixes for this vulnerability (March 2018 security patch or later).
- 2. If updates are not available for your device, consider disabling Bluetooth when not in use.
- 3. Be cautious about enabling Bluetooth in public places where attackers might be present.
- 4. Device manufacturers should ensure they've incorporated the Android security patches addressing this issue.
- 5. Enterprise environments should enforce security policies requiring devices to have the latest security patches installed.
References
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.