CVE-2023-38302

A certain software build for the Sharp Rouvo V device (SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_530:user/release-keys) leaks the Wi-Fi MAC address and the Bluetooth MAC address to system properties that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in this instance they are leaked by a high-privilege process and can be obtained indirectly. This malicious app reads from the "ro.boot.wifi_mac" system property to indirectly obtain the Wi-Fi MAC address and reads the "ro.boot.bt_mac" system property to obtain the Bluetooth MAC address.
Configurations

No configuration.

History

27 Mar 2025, 21:15

Type Values Removed Values Added
CWE CWE-200
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3

21 Nov 2024, 08:13

Type Values Removed Values Added
References () https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf - () https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf -
Summary
  • (es) Cierta compilación de software para el dispositivo Sharp Rouvo V (SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_530:user/release-keys) filtra la dirección MAC de Wi-Fi y la dirección MAC de Bluetooth a las propiedades del sistema a las que se puede acceder por cualquier aplicación local en el dispositivo sin ningún permiso o privilegio especial. Google restringió que las aplicaciones de terceros obtengan directamente identificadores de dispositivos no reiniciables en Android 10 y versiones posteriores, pero en este caso se filtran mediante un proceso de alto privilegio y se pueden obtener indirectamente. Esta aplicación maliciosa lee la propiedad del sistema "ro.boot.wifi_mac" para obtener indirectamente la dirección MAC de Wi-Fi y lee la propiedad del sistema "ro.boot.bt_mac" para obtener la dirección MAC de Bluetooth.

22 Apr 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-22 15:15

Updated : 2025-03-27 21:15


NVD link : CVE-2023-38302

Mitre link : CVE-2023-38302

CVE.ORG link : CVE-2023-38302


JSON object : View

Products Affected

No product.

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor