In BTMBleVerifySignature of btmble.cc, there is a possible way to bypass signature validation due to side channel information disclosure. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
{ "vanir_signatures": [ { "digest": { "threshold": 0.9, "line_hashes": [ "73604053638893654442075446677088485044", "282059303716900127485036754162182556256", "217706887452652472909775799195184585659", "115226672382767376581534584658274644606", "310695147471039599526984977300380065240", "55480721152862074085235881525030013126", "245145732093958882139270013324568634314", "223569041101689020007613077388764483895", "71874906898404393574206338313885779023", "36445870366340891229985690735977164152", "61195958099683017752557694320560501319", "164740465748603696628054194055557693252", "173240706905291627675062426793424631335" ] }, "id": "ASB-A-274478807-7d385009", "source": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/7a960ac1c0cbc6d3949b6eaa7a86302a0b20c04f", "deprecated": false, "signature_version": "v1", "target": { "file": "system/stack/btm/btm_ble.cc" }, "signature_type": "Line" } ], "fixes": [ "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/7a960ac1c0cbc6d3949b6eaa7a86302a0b20c04f" ], "spl": "2023-12-01", "severity": "High", "types": [ "EoP" ] }