CVE-2013-6282
HIGH KEVAndroid get_user/put_user Exploit
Title source: metasploitDescription
The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.
Exploits (7)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalandroid
https://www.exploit-db.com/exploits/40975
metasploit
WORKING POC
EXCELLENT
by fi01, cubeundcube, timwr · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/android/local/put_user_vroot.rb
References (9)
Scores
CVSS v3
8.8
EPSS
0.6765
EPSS Percentile
98.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2022-09-15
VulnCheck KEV
2013-11-19
InTheWild.io
2013-10-01
ENISA EUVD
EUVD-2013-6110
CWE
CWE-20
Status
published
Products (1)
linux/linux_kernel
< 3.2.54
Published
Nov 20, 2013
KEV Added
Sep 15, 2022
Tracked Since
Feb 18, 2026