Multiple vulnerabilities in Google Android



Published: 2021-05-20 | Updated: 2021-09-02
Risk High
Patch available YES
Number of vulnerabilities 17
CVE ID CVE-2021-1906
CVE-2021-1891
CVE-2021-1905
CVE-2021-1927
CVE-2020-11273
CVE-2020-11274
CVE-2020-11279
CVE-2020-11284
CVE-2020-11285
CVE-2020-11288
CVE-2020-11289
CVE-2021-1910
CVE-2021-1915
CVE-2019-2219
CVE-2020-29661
CVE-2021-28663
CVE-2021-28664
CWE ID CWE-416
CWE-617
CWE-190
CWE-119
CWE-125
CWE-787
CWE-415
CWE-120
CWE-362
CWE-667
Exploitation vector Network
Public exploit Vulnerability #1 is being exploited in the wild.
Vulnerability #3 is being exploited in the wild.
Vulnerability #16 is being exploited in the wild.
Vulnerability #17 is being exploited in the wild.
Vulnerable software
Subscribe
Google Android
Operating systems & Components / Operating system

Vendor Google, Inc.

Security Advisory

1) Detection of Error Condition Without Action

Risk: Medium

CVSSv3.1: 5.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C] [PCI]

CVE-ID: CVE-2021-1906

CWE-ID: -

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the Graphics component. A local user can trigger a new GPU address allocation failure and perform a denial of service attack.

Note, the vulnerability is being used in limited targeted attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

2) Use-after-free

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2021-1891

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the Audio component. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.


Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use-after-free

Risk: Medium

CVSSv3.1: 7.5 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C] [PCI]

CVE-ID: CVE-2021-1905

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system

The vulnerability exists due to a use-after-free error in Graphics component when handling memory mapping of multiple processes simultaneously. A local user can escalate privileges on the system.

Note, the vulnerability is being used in limited targeted attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

4) Use-after-free

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2021-1927

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in DSP Services within FastRPC driver. A local user can execute arbitrary code with elevated privileges.


Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Reachable Assertion

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-11273

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion within the Modem component. Histogram type KPI was teardown with the assumption of the existence of histogram binning info and will lead to null pointer access when histogram binning info is missing due to lack of null check.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Reachable Assertion

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-11274

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion within the Modem component due to invalid configuration. A remote attacker can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Integer overflow

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-11279

CWE-ID: CWE-190 - Integer Overflow or Wraparound

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to integer overflow within the Modem component when processing crafted SDES packets. A remote attacker can pass specially crafted SDES packets to the system, trigger integer overflow and gain access to sensitive information.


Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Buffer overflow

Risk: Medium

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-11284

CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in QTEE. Locked memory can be unlocked and modified by non secure boot loader through improper system call sequence making the memory region untrusted source of input for secure boot loader.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Out-of-bounds read

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-11285

CWE-ID: CWE-125 - Out-of-bounds Read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the Data Modem component when processing RTCP packets. A remote attacker can create a specially crafted RTCP packets to the system, trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Out-of-bounds write

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-11288

CWE-ID: CWE-787 - Out-of-bounds Write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in Content Protection feature while processing commands. A local user can trigger an out-of-bounds write error in playready and escalate privileges on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Out-of-bounds write

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-11289

CWE-ID: CWE-787 - Out-of-bounds Write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in TZ command handler within the Content Protection feature. A local user can pass a specially crafted command ID, trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Double Free

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2021-1910

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Video component. A remote attacker can trick the victim to play a specially crafted video file, trigger a double free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Buffer overflow

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2021-1915

CWE-ID: CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in WLAN component when processing NDP. A local user can trigger buffer overflow and escalate privileges on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Race condition

Risk: Low

CVSSv3.1: 4.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2019-2219

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local authenticated user to gain access to sensitive information.

In System UI, there is a possible bypass of user's consent for access to sensor data due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-119041698

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Improper locking

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-29661

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a escalate privileges on the system.

The vulnerability exists due to locking error in the tty subsystem of the Linux kernel in drivers/tty/tty_jobctrl.c. An local user can exploit this vulnerability to trigger a use-after-free error against TIOCSPGRP and execute arbitrary code with elevated privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Use-after-free

Risk: High

CVSSv3.1: 7.5 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C] [PCI]

CVE-ID: CVE-2021-28663

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the Arm Mali GPU kernel driver. This affects Bifrost r0p0 through r28p0 before r29p0, Valhall r19p0 through r28p0 before r29p0, and Midgard r4p0 through r30p0. A local application can trigger a use-after-free error and execute arbitrary code on the system with elevated privileges.

Note, the vulnerability is being actively exploited in the wild.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

17) Buffer overflow

Risk: High

CVSSv3.1: 7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C] [PCI]

CVE-ID: CVE-2021-28664

CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer

Exploit availability: No

Description

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the Arm Mali GPU kernel driver. This affects Bifrost r0p0 through r28p0 before r29p0, Valhall r19p0 through r28p0 before r29p0, and Midgard r8p0 through r30p0. A local application can trigger memory corruption and execute arbitrary code on the system with elevated privileges.

Note, the vulnerability is being actively exploited in the wild.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Google Android: 8.1, 8.1 2020-12-05, 8.1 2021-04-01, 8.1 2021-05-01, 9.0, 9.0 2020-12-05, 9.0 2021-04-01, 9.0 2021-04-05, 9.0 2021-05-01, 10.0, 10.0 2020-12-05, 10.0 2021-04-01, 10.0 2021-04-05, 10.0 2021-05-01, 11.0, 11.0 2020-12-05, 11.0 2021-04-01, 11.0 2021-04-05, 11.0 2021-05-01

CPE External links

https://source.android.com/security/bulletin/2021-05-01

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.



###SIDEBAR###