First published: Mon Mar 06 2023(Updated: )
In onParentVisible of HeaderPrivacyIconsController.kt, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with physical access to a device that's been factory reset with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-253043058
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Google Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-20926.
The severity level of CVE-2023-20926 is high.
The missing permission check in onParentVisible of HeaderPrivacyIconsController.kt can be exploited to bypass factory reset protections, leading to local escalation of privilege with physical access to a device that's been factory reset with no additional execution privileges.
Google Android versions 12.0, 12.1, and 13.0 are affected by this vulnerability.
To fix CVE-2023-20926, it is recommended to apply the necessary patches provided by Google Android. Please refer to the official references for more information.