Security bypass in Google Android



Published: 2013-08-11 | Updated: 2017-01-16
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2013-7372
CWE ID CWE-310
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Google Android
Operating systems & Components / Operating system

Vendor Google, Inc.

Security Advisory

This security advisory describes one low risk vulnerability.

1) Security bypass

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2013-7372

CWE-ID: CWE-310 - Cryptographic Issues

Exploit availability: No

Description

The vulnerability allows a renote attacker to bypass security restriction on the target system.

The weakness is due to the use of an incorrect offset value by the engineNextBytes function in Apache Harmony, as used in the Java Cryptography Architecture (JCA) in Android . A remote attacker can leverage the resulting PRNG predictability, defeat cryptographic protection mechanisms and launch further attacks on the system.

Successful exploitation of the vulnerablity results in security bypass on the vulnerable system.

Mitigation

Update to version 4.4.

Vulnerable software versions

Google Android: 4.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.1, 4.1.2, 4.2, 4.2.1, 4.2.2, 4.3, 4.3.1

CPE External links

https://android-developers.googleblog.com/2013/08/some-securerandom-thoughts.html

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###