CVE-2023-21232
https://notcve.org/view.php?id=CVE-2023-21232
In multiple locations, there is a possible way to retrieve sensor data without permissions due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/wear/2023-08-01 •
CVE-2023-21234
https://notcve.org/view.php?id=CVE-2023-21234
In launchConfirmationActivity of ChooseLockSettingsHelper.java, there is a possible way to enable developer options without the lockscreen PIN due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/wear/2023-08-01 • CWE-862: Missing Authorization •
CVE-2023-21235
https://notcve.org/view.php?id=CVE-2023-21235
In onCreate of LockSettingsActivity.java, there is a possible way set a new lockscreen PIN without entering the existing PIN due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/docs/security/bulletin/wear/2023/2023-08-01 •
CVE-2023-35689
https://notcve.org/view.php?id=CVE-2023-35689
In checkDebuggingDisallowed of DeviceVersionFragment.java, there is a possible way to access adb before SUW completion due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/wear/2023-08-01 • CWE-1188: Initialization of a Resource with an Insecure Default •
CVE-2023-21292
https://notcve.org/view.php?id=CVE-2023-21292
In openContentUri of ActivityManagerService.java, there is a possible way for a third party app to obtain restricted files due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. • https://android.googlesource.com/platform/frameworks/base/+/d10b27e539f7bc91c2360d429b9d05f05274670d https://source.android.com/security/bulletin/2023-08-01 •