First published: Mon Aug 07 2023(Updated: )
In onCreate of ManagePermissionsActivity.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with physical access to a device that's been factory reset with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-21134 has a severity rating of high due to the potential for local escalation of privilege.
To fix CVE-2023-21134, ensure that device software is updated to the latest version provided by Google that addresses the vulnerability.
CVE-2023-21134 affects Android versions 12.0, 12.1, and 13.0.
CVE-2023-21134 enables local escalation of privilege attacks, allowing unauthorized access after a factory reset.
Yes, physical access to the device is required to exploit CVE-2023-21134.