Oct. 30, 2023, 5:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

In Bluetooth, there is a possibility of code-execution due to a use after free. This could lead to paired device escalation of privilege in the privileged Bluetooth process with no additional execution privileges needed. User interaction is not needed for exploitation.

android bluetooth code cve device escalation exploitation free privilege privileged privileges process

Information System Security Officer / Auditor

@ Peraton | Washington, DC, United States

Senior Cloud Security Engineer

@ Alludo | US | Boston, MA, US | San Francisco, CA, US | Austin, TX, US

Tier 3 - Malware Analyst, SME

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States

Temp to Hire Senior DevSecOps Engineer

@ Scientific Systems Company, Inc. | Burlington, Massachusetts, United States

Security Engineer III - Splunk | SIEM

@ JPMorgan Chase & Co. | Plano, TX, United States

Information Systems Security Officer / Auditor

@ Peraton | Washington, DC, United States