The vulnerability allows a low privileged (untrusted) application to modify a critical system property that should be denied, in order to enable the ADB (Android Debug Bridge) protocol to be exposed on the network, exploiting it to gain a privileged shell on the device without requiring the physical access through USB.
References
Link Resource
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html Mitigation Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: bosch

Published: 2023-10-25T13:27:09.366Z

Updated: 2023-10-25T13:27:09.366Z

Reserved: 2023-10-18T09:35:22.492Z


Link: CVE-2023-43488

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-10-25T18:17:31.800

Modified: 2023-11-06T14:41:18.393


Link: CVE-2023-43488

JSON object: View

cve-icon Redhat Information

No data.

CWE