
Cloud Vulnerability DB
A community-led vulnerabilities database
In bta_dm_remove_sec_dev_entry of bta_dm_act.cc, there is a possible out of bounds read due to a use after free vulnerability (CVE-2018-9483). This vulnerability affects Android versions 7.0, 7.1.1, 7.1.2, 8.0, 8.1, and 9.0, and could lead to remote information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation (Android Bulletin).
The vulnerability is classified as an Information Disclosure (ID) issue with High severity. It received a CVSS v3.1 Base Score of 6.5 (Medium) with the vector string CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. The vulnerability is associated with CWE-416 (Use After Free) and CWE-125 (Out-of-bounds Read) (NVD).
This vulnerability could enable a remote attacker to access sensitive information over Bluetooth without requiring any user interaction or additional execution privileges. The high confidentiality impact rating indicates that the vulnerability could lead to significant information disclosure (Android Bulletin, NVD).
Google released patches for this vulnerability as part of the September 2018 Android Security Bulletin. The fix is included in the security patch levels 2018-09-01 or later. Users are advised to update their Android devices to the latest security patch level to address this vulnerability (Android Bulletin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."