The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-21085

CVE-2023-21085: Google Android NFC RCE Vulnerability

CVE-2023-21085 is a remote code execution vulnerability in Google Android's NFC component that allows proximal attackers to execute code without user interaction. This article covers technical details, affected versions, impact, and mitigation.

Published: February 4, 2026

CVE-2023-21085 Overview

CVE-2023-21085 is an out-of-bounds write vulnerability in the Android operating system's NFC (Near Field Communication) subsystem. The vulnerability exists in the nci_snd_set_routing_cmd function within the nci_hmsgs.cc file, where a missing bounds check allows an attacker to write data beyond the allocated buffer boundaries. This flaw enables remote code execution from an adjacent network position without requiring any user interaction or additional execution privileges.

Critical Impact

This vulnerability allows adjacent network attackers to achieve remote code execution on affected Android devices without user interaction, potentially leading to complete device compromise.

Affected Products

  • Google Android 11.0
  • Google Android 12.0
  • Google Android 12.1 (Android 12L)
  • Google Android 13.0

Discovery Timeline

  • 2023-04-19 - CVE-2023-21085 published to NVD
  • 2025-02-05 - Last updated in NVD database

Technical Details for CVE-2023-21085

Vulnerability Analysis

This vulnerability is classified as CWE-787 (Out-of-Bounds Write), which occurs when the nci_snd_set_routing_cmd function in Android's NFC Interface (NCI) module fails to properly validate input boundaries before writing data to memory. The NCI layer handles communication between the Android host and the NFC Controller (NFCC), and routing commands are used to configure how NFC data is processed and forwarded.

The missing bounds check in the routing command handler allows malformed NFC messages to trigger memory corruption. Since NFC operates over short-range wireless communication, the attack vector is classified as adjacent network (proximal), meaning an attacker must be in physical proximity to the target device to exploit this vulnerability.

Root Cause

The root cause of CVE-2023-21085 is a missing bounds check in the nci_snd_set_routing_cmd function located in nci_hmsgs.cc. When processing NFC routing configuration commands, the function writes data to a buffer without first verifying that the data size does not exceed the buffer's allocated capacity. This oversight allows specially crafted NFC messages to write beyond buffer boundaries, corrupting adjacent memory regions.

Attack Vector

The attack requires adjacency to the target device through NFC communication range (typically within 4 centimeters). An attacker can craft malicious NFC packets containing oversized routing configuration data that, when processed by the vulnerable function, triggers the out-of-bounds write condition. Since no user interaction is required and no additional privileges are needed for exploitation, an attacker with appropriate hardware can silently compromise a vulnerable device by simply being in close proximity.

The attack scenario involves:

  1. Attacker positions themselves within NFC range of a target Android device
  2. Malicious NFC packets are transmitted containing crafted routing command data
  3. The nci_snd_set_routing_cmd function processes the data without bounds validation
  4. Memory corruption occurs, potentially allowing arbitrary code execution
  5. Attacker gains execution context on the target device

Detection Methods for CVE-2023-21085

Indicators of Compromise

  • Unexpected NFC service crashes or restarts on Android devices
  • Anomalous memory corruption signatures in system logs related to NCI or NFC components
  • Unusual NFC activity or connections without user initiation
  • System instability following NFC-enabled interactions

Detection Strategies

  • Monitor Android system logs for crashes or exceptions originating from nci_hmsgs.cc or NFC-related components
  • Implement mobile device management (MDM) solutions to track NFC service health and detect anomalies
  • Deploy endpoint detection solutions capable of identifying memory corruption exploitation attempts
  • Audit device firmware versions against known vulnerable Android releases (11.0, 12.0, 12.1, 13.0)

Monitoring Recommendations

  • Enable verbose logging for NFC services on managed Android devices to capture potential exploitation attempts
  • Implement network-level monitoring for environments where NFC-enabled devices operate
  • Establish baseline behavior for NFC service operations to identify deviations
  • Configure alerts for repeated NFC service failures which may indicate exploitation attempts

How to Mitigate CVE-2023-21085

Immediate Actions Required

  • Apply the April 2023 Android security patch immediately to all affected devices
  • For devices that cannot be immediately patched, consider disabling NFC functionality as a temporary measure
  • Audit all Android devices in the organization to identify those running vulnerable versions (Android 11, 12, 12L, 13)
  • Implement physical security measures to limit attacker proximity to critical devices

Patch Information

Google addressed this vulnerability in the Android Security Bulletin April 2023. The patch adds proper bounds checking to the nci_snd_set_routing_cmd function to prevent out-of-bounds write conditions. Organizations should ensure all Android devices are updated to security patch level 2023-04-01 or later.

The fix is tracked under Android ID A-264879662 and is included in all Android security updates released on or after April 1, 2023.

Workarounds

  • Disable NFC on devices where it is not essential for business operations until patching is complete
  • Implement strict physical access controls in environments with sensitive Android devices
  • Use mobile device management (MDM) to enforce NFC disable policies on unpatched devices
  • Consider network segmentation to isolate devices that cannot be immediately updated
bash
# Disable NFC via ADB on managed devices (temporary workaround)
adb shell settings put global nfc_on 0
adb shell svc nfc disable

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechGoogle Android

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-787
  • Vendor Resources
  • Android Security Bulletin April 2023
  • Related CVEs
  • CVE-2026-0114: Google Android Modem RCE Vulnerability

  • CVE-2026-0116: Google Android RCE Vulnerability

  • CVE-2026-0120: Google Android Modem RCE Vulnerability

  • CVE-2026-0122: Google Android RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English