2025-01-22 00:58:46 +00:00
{
"id" : "CVE-2024-34730" ,
"sourceIdentifier" : "security@android.com" ,
"published" : "2025-01-21T23:15:13.297" ,
2025-04-22 16:03:56 +00:00
"lastModified" : "2025-04-22T14:32:46.433" ,
"vulnStatus" : "Analyzed" ,
2025-01-22 00:58:46 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "In multiple locations, there is a possible bypass of user consent to enabling new Bluetooth HIDs due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
2025-01-26 03:03:52 +00:00
} ,
{
"lang" : "es" ,
"value" : "En varias ubicaciones, existe la posibilidad de omitir el consentimiento del usuario para habilitar nuevos HID de Bluetooth debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
2025-01-22 00:58:46 +00:00
}
] ,
2025-01-22 19:03:53 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-276"
}
]
}
] ,
2025-04-22 16:03:56 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "879FFD0C-9B38-4CAA-B057-1086D794D469"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
}
]
}
]
}
] ,
2025-01-22 00:58:46 +00:00
"references" : [
{
"url" : "https://source.android.com/security/bulletin/2025-01-01" ,
2025-04-22 16:03:56 +00:00
"source" : "security@android.com" ,
"tags" : [
"Vendor Advisory"
]
2025-01-22 00:58:46 +00:00
}
]
}