First published: Mon Jun 05 2023(Updated: )
In getFullScreenIntentDecision of NotificationInterruptStateProviderImpl.java, there is a possible activity launch while the app is in the background due to a BAL bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-274759612
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Google Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-21129 is rated as a moderate vulnerability due to its potential for local escalation of privilege.
To fix CVE-2023-21129, update to the latest version of Android available for your device.
CVE-2023-21129 affects Android versions 11.0, 12.0, 12.1, and 13.0.
CVE-2023-21129 impacts the NotificationInterruptStateProviderImpl function, enabling possible activity launches while apps are in the background.
Yes, user interaction is required for the exploitation of CVE-2023-21129.