The vulnerability was exploited against Android devices in October and November 2013. The vulnerability is originally in SE Linux kernel.
Vulnerable component: Google Android
CVSSv3 score: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
CWE-ID: CWE-20 - Improper Input Validation
The vulnerability allows a local attacker to obtain elevated privileges on the target system.
The weakness exists due to an error in the put_user/get_user kernel API. A local attacker can use a malicious application to read and write kernel memory and gain kernel privileges on the system.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: the vulnerability was being actively exploited.
- Android - get_user/put_user Exploit (Metasploit) [Exploit-DB]
Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.