CVE-2024-34722
NixOS vulnerability analysis and mitigation

Overview

CVE-2024-34722 is a vulnerability discovered in Android's Bluetooth implementation, specifically in the smpprocrand function of smp_act.cc. The vulnerability was disclosed on July 9, 2024, affecting Android versions 12.0, 12.1, 13.0, and 14.0. It involves an authentication bypass during legacy BLE (Bluetooth Low Energy) pairing due to incorrect implementation of a protocol (NVD).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The weakness has been classified under CWE-303 (Incorrect Implementation of Authentication Algorithm). The vulnerability exists in the Bluetooth pairing process, specifically during the legacy BLE pairing procedure, where the authentication mechanism can be bypassed (NVD).

Impact

The vulnerability could lead to remote escalation of privilege with no additional execution privileges needed. The attack requires no user interaction for exploitation, potentially allowing unauthorized access to affected devices through Bluetooth connections (CVE).

Mitigation and workarounds

A fix has been implemented and committed to the Android Bluetooth codebase, addressing the authentication bypass issue in the SMP (Security Manager Protocol) implementation (Android Patch).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management