CVE-2024-34722Incorrect Implementation of Authentication Algorithm in Packages Modules Bluetooth

Severity
8.8HIGHNVD
EPSS
0.2%
top 59.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 9
Latest updateJan 1

Description

In smp_proc_rand of smp_act.cc, there is a possible authentication bypass during legacy BLE pairing due to incorrect implementation of a protocol. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

Androidplatform/system_bt12:012:2025-01-01+1
Androidplatform/packages_modules_bluetooth15-next:015-next:2025-01-01+2
CVEListV5google/android4 versions+3
NVDgoogle/android4 versions+3

Patches

🔴Vulnerability Details

3
OSV
CVE-2024-34722: In smp_proc_rand of smp_act2025-01-01
GHSA
GHSA-4wf4-9rp2-2vhg: In smp_proc_rand of smp_act2024-07-09
CVEList
CVE-2024-34722: In smp_proc_rand of smp_act2024-07-09

📋Vendor Advisories

1
Android
CVE-2024-34722: Android Security Bulletin 2025-01-01 CVE: CVE-2024-34722 Severity: HIGH Type: EoP Affected AOSP versions: 12, 12L, 13, 14 References: A-251514170 [2]2025-01-01
CVE-2024-34722 — HIGH severity | cvebase