Starting March 27, 2025, we recommend using android-latest-release
instead of aosp-main
to build and contribute to AOSP. For more information, see Changes to AOSP.
Pixel Watch Security Bulletin—December 2023
Stay organized with collections
Save and categorize content based on your preferences.
Published December 11, 2023
The Pixel Watch Security Bulletin contains details of security
vulnerabilities affecting Pixel Watch
devices (Google Devices). For Google devices, security patch levels of
2023-12-05 or later address all applicable issues in the December 2023 Android
Security Bulletin and all issues in this bulletin. To learn how to check a
device's security patch level, see Pixel
Watch Help Center
All supported Google devices will receive an update to the 2023-12-05 patch
level. We encourage all customers to accept these updates to their devices.
Announcements
In addition to the security vulnerabilities described in the Android
Security Bulletin, Google Pixel Watch also contains patches for the security
vulnerabilities described in this bulletin and in the Pixel Update Bulletin
Security patches
Vulnerabilities are grouped under the component that they affect. There is a
description of the issue and a table with the CVE, associated references, type
of vulnerability, severity,
and updated Android Open Source Project (AOSP) versions (where applicable). When
available, we link the public change that addressed the issue to the bug ID,
like the AOSP change list. When multiple changes relate to a single bug,
additional references are linked to numbers following the bug ID.
CVE |
References |
Type |
Severity |
Component |
CVE-2023-48418 |
A-296051696 |
EoP |
High |
google_clockwork |
CVE-2023-4164 |
A-294235313 |
ID |
Moderate |
WAC |
Common questions and answers
This section answers common questions that may occur after reading this
bulletin.
1. How do I determine if my device is updated to address these
issues?
Security patch levels of 2023-12-05 or later address all issues associated
with the 2023-12-05 security patch level and all previous patch levels. To learn
how to check a device's security patch level, read the instructions on the Pixel
Watch Release Notes
2. Why are security vulnerabilities split between this bulletin and
the Android Security Bulletins?
Security vulnerabilities that are documented in the Android Security
Bulletins are required to declare the latest security patch level on Android
devices. Additional security vulnerabilities, such as those documented in this
bulletin are not required for declaring a security patch level.
3. What do the entries in the Type column mean?
Entries in the Type column of the vulnerability details table
reference the classification of the security vulnerability.
Abbreviation |
Definition |
RCE |
Remote code execution |
EoP |
Elevation of privilege |
ID |
Information disclosure |
DoS |
Denial of service |
N/A |
Classification not available |
4. What do the entries in the References column
mean?
Entries under the References column of the vulnerability details
table may contain a prefix identifying the organization to which the reference
value belongs.
Prefix |
Reference |
A- |
Android bug ID |
5. What does an * next to the Android bug ID in the
References column mean?
Issues that are not publicly available have an * next to the Android bug ID
in the References column.
Versions
Version |
Date |
Notes |
1.0 |
December 11, 2023 |
Bulletin Published |
Content and code samples on this page are subject to the licenses described in the Content License. Java and OpenJDK are trademarks or registered trademarks of Oracle and/or its affiliates.
Last updated 2024-08-26 UTC.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2024-08-26 UTC."],[],[],null,["# Pixel Watch Security Bulletin—December 2023\n\n*Published December 11, 2023*\n\nThe Pixel Watch Security Bulletin contains details of security\nvulnerabilities affecting [Pixel Watch\ndevices](https://store.google.com/product/google_pixel_watch) (Google Devices). For Google devices, security patch levels of\n2023-12-05 or later address all applicable issues in the December 2023 [Android\nSecurity Bulletin](/docs/security/bulletin/asb-overview) and all issues in this bulletin. To learn how to check a\ndevice's security patch level, see [Pixel\nWatch Help Center](https://support.google.com/googlepixelwatch/answer/13044412#zippy=%2Cupdate-your-google-pixel-watch) \n\nAll supported Google devices will receive an update to the 2023-12-05 patch\nlevel. We encourage all customers to accept these updates to their devices.\n\nAnnouncements\n-------------\n\nIn addition to the security vulnerabilities described in the Android\nSecurity Bulletin, Google Pixel Watch also contains patches for the security\nvulnerabilities described in this bulletin and in the Pixel Update Bulletin\n\nSecurity patches\n----------------\n\nVulnerabilities are grouped under the component that they affect. There is a\ndescription of the issue and a table with the CVE, associated references, [type\nof vulnerability](/docs/security/bulletin/pixel/2023-10-01#type), [severity](/docs/security/overview/updates-resources#severity),\nand updated Android Open Source Project (AOSP) versions (where applicable). When\navailable, we link the public change that addressed the issue to the bug ID,\nlike the AOSP change list. When multiple changes relate to a single bug,\nadditional references are linked to numbers following the bug ID.\n\n| CVE | References | Type | Severity | Component |\n|----------------|-------------|------|----------|------------------|\n| CVE-2023-48418 | A-296051696 | EoP | High | google_clockwork |\n| CVE-2023-4164 | A-294235313 | ID | Moderate | WAC |\n\nCommon questions and answers\n----------------------------\n\nThis section answers common questions that may occur after reading this\nbulletin. \n\n**1. How do I determine if my device is updated to address these\nissues?** \n\nSecurity patch levels of 2023-12-05 or later address all issues associated\nwith the 2023-12-05 security patch level and all previous patch levels. To learn\nhow to check a device's security patch level, read the instructions on the Pixel\nWatch Release Notes \n\n**2. Why are security vulnerabilities split between this bulletin and\nthe Android Security Bulletins?** \n\nSecurity vulnerabilities that are documented in the Android Security\nBulletins are required to declare the latest security patch level on Android\ndevices. Additional security vulnerabilities, such as those documented in this\nbulletin are not required for declaring a security patch level. \n\n**3. What do the entries in the *Type* column mean?** \n\nEntries in the *Type* column of the vulnerability details table\nreference the classification of the security vulnerability.\n\n| Abbreviation | Definition |\n|--------------|------------------------------|\n| RCE | Remote code execution |\n| EoP | Elevation of privilege |\n| ID | Information disclosure |\n| DoS | Denial of service |\n| N/A | Classification not available |\n\n**4. What do the entries in the *References* column\nmean?** \n\nEntries under the *References* column of the vulnerability details\ntable may contain a prefix identifying the organization to which the reference\nvalue belongs.\n\n| **Prefix** | **Reference** |\n|------------|----------------|\n| A- | Android bug ID |\n\n**5. What does an \\* next to the Android bug ID in the\n*References* column mean?** \n\nIssues that are not publicly available have an \\* next to the Android bug ID\nin the *References* column.\n\nVersions\n--------\n\n| Version | Date | Notes |\n|---------|-------------------|--------------------|\n| 1.0 | December 11, 2023 | Bulletin Published |"]]