First published: Mon Oct 02 2023(Updated: )
In visitUris of Notification.java, there is a possible bypass of user profile boundaries due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
https://android.googlesource.com/platform/frameworks/base/+/20aedba4998373addc2befcc455a118585559fef
https://android.googlesource.com/platform/frameworks/base/+/3a448067ac9ebdf669951e90678c2daa592a81d3
https://android.googlesource.com/platform/frameworks/base/+/5a3d0c131175d923cf35c7beb3ee77a9e6485dad
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2023-21244.
CVE-2023-21244 has a severity rating of high.
CVE-2023-21244 affects the Google Android software.
No, user interaction is not needed for exploitation of CVE-2023-21244.
To fix CVE-2023-21244, it is recommended to apply the latest security updates provided by Google for the Android operating system.