CVE-2013-6282

HIGH KEV

Android get_user/put_user Exploit

Title source: metasploit

Description

The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.

Exploits (7)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalandroid
https://www.exploit-db.com/exploits/40975
exploitdb WORKING POC
by Piotr Szerman · clocalarm
https://www.exploit-db.com/exploits/31574
nomisec WORKING POC 27 stars
by fi01 · poc
https://github.com/fi01/libput_user_exploit
nomisec WORKING POC 21 stars
by timwr · local
https://github.com/timwr/CVE-2013-6282
nomisec WORKING POC 13 stars
by jeboo · local
https://github.com/jeboo/bypasslkm
nomisec WORKING POC 8 stars
by fi01 · poc
https://github.com/fi01/libget_user_exploit
metasploit WORKING POC EXCELLENT
by fi01, cubeundcube, timwr · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/android/local/put_user_vroot.rb

Scores

CVSS v3 8.8
EPSS 0.6765
EPSS Percentile 98.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-09-15
VulnCheck KEV 2013-11-19
InTheWild.io 2013-10-01
ENISA EUVD EUVD-2013-6110
CWE
CWE-20
Status published
Products (1)
linux/linux_kernel < 3.2.54
Published Nov 20, 2013
KEV Added Sep 15, 2022
Tracked Since Feb 18, 2026