First published: Mon Feb 06 2023(Updated: )
In onStart of BluetoothSwitchPreferenceController.java, there is a possible permission bypass due to a confused deputy. This could lead to remote escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-244423101
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | =11.0 | |
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20946 has a critical severity rating due to its potential for remote escalation of privilege.
To fix CVE-2023-20946, users should update their Android device to the latest security patch available from Google.
CVE-2023-20946 affects Android versions 11.0, 12.0, 12.1, and 13.0.
Yes, CVE-2023-20946 can be exploited remotely without any user interaction required.
CVE-2023-20946 is classified as a permission bypass vulnerability within the Bluetooth settings.