CVE-2020-0471Improper Input Validation in Google Android

Severity
9.8CRITICALNVD
EPSS
2.5%
top 14.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 11
Latest updateMay 24

Description

In reassemble_and_dispatch of packet_fragmenter.cc, there is a possible way to inject packets into an encrypted Bluetooth connection due to improper input validation. This could lead to remote escalation of privilege between two Bluetooth devices by a proximal attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-8.0, Android-8.1, Android-9, Android-10, Android-11; Android ID: A-169327567.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

CVEListV5google/android5 versions+4
NVDgoogle/android5 versions+4
Androidplatform/system_bt8.0:08.0:2021-01-01+4

Patches

🔴Vulnerability Details

3
GHSA
GHSA-46qp-3938-63jv: In reassemble_and_dispatch of packet_fragmenter2022-05-24
CVEList
CVE-2020-0471: In reassemble_and_dispatch of packet_fragmenter2021-01-11
OSV
CVE-2020-0471: In reassemble_and_dispatch of packet_fragmenter2021-01-01

📋Vendor Advisories

1
Android
CVE-2020-0471: Android Security Bulletin 2021-01-01 CVE: CVE-2020-0471 Severity: HIGH Type: EoP Affected AOSP versions: 82021-01-01
CVE-2020-0471 — Improper Input Validation in Google | cvebase