{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-48418","assignerOrgId":"83238938-5644-45f0-9007-c0392bcf6222","state":"PUBLISHED","assignerShortName":"Google_Devices","dateReserved":"2023-11-16T16:28:09.701Z","datePublished":"2024-01-02T22:25:31.573Z","dateUpdated":"2025-06-03T14:45:10.474Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Android"],"product":"Pixel Watch","vendor":"Google","versions":[{"status":"affected","version":"11"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">&nbsp;In checkDebuggingDisallowed of DeviceVersionFragment.java, there is a</span><br><span style=\"background-color: rgb(255, 255, 255);\">&nbsp; &nbsp; possible way to access adb before SUW completion due to an insecure default</span><br><span style=\"background-color: rgb(255, 255, 255);\">&nbsp; &nbsp; value. This could lead to local escalation of privilege with no additional</span><br><span style=\"background-color: rgb(255, 255, 255);\">&nbsp; &nbsp; execution privileges needed. User interaction is not needed for</span><br><span style=\"background-color: rgb(255, 255, 255);\">&nbsp; &nbsp; exploitation</span><br>"}],"value":"In checkDebuggingDisallowed of DeviceVersionFragment.java, there is a\n    possible way to access adb before SUW completion due to an insecure default\n    value. This could lead to local escalation of privilege with no additional\n    execution privileges needed. User interaction is not needed for\n    exploitation"}],"impacts":[{"capecId":"CAPEC-233","descriptions":[{"lang":"en","value":"CAPEC-233 Privilege Escalation"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-269","description":"CWE-269 Improper Privilege Management","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"83238938-5644-45f0-9007-c0392bcf6222","shortName":"Google_Devices","dateUpdated":"2024-01-10T23:06:12.635Z"},"references":[{"url":"https://source.android.com/docs/security/bulletin/pixel-watch/2023/2023-12-01"},{"url":"http://packetstormsecurity.com/files/176446/Android-DeviceVersionFragment.java-Privilege-Escalation.html"}],"source":{"discovery":"UNKNOWN"},"title":"User Build misconfiguration resulting in local escalation of privilege","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T21:30:35.154Z"},"title":"CVE Program Container","references":[{"url":"https://source.android.com/docs/security/bulletin/pixel-watch/2023/2023-12-01","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/176446/Android-DeviceVersionFragment.java-Privilege-Escalation.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-08T15:41:16.354905Z","id":"CVE-2023-48418","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-03T14:45:10.474Z"}}]}}