First published: Mon Aug 07 2023(Updated: )
In onCreate of ManagePermissionsActivity.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with physical access to a device that's been factory reset with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-21140 has been classified as a critical vulnerability due to its potential to allow local escalation of privilege.
To fix CVE-2023-21140, update your Android device to the latest stable version that contains the security patch addressing this vulnerability.
CVE-2023-21140 affects users of Google Android versions 12.0, 12.1, and 13.0.
No, CVE-2023-21140 requires physical access to the device to exploit the vulnerability.
If CVE-2023-21140 is not addressed, an attacker with physical access could potentially bypass factory reset protections and gain unauthorized privileges.