First published: Wed Jul 05 2023(Updated: )
In ShortcutInfo of ShortcutInfo.java, there is a possible way for an app to retain notification listening access due to an uncaught exception. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | =11.0 | |
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 |
https://android.googlesource.com/platform/frameworks/base/+/fc1b9998ca8a9fceba47d67fd9ea9b45705b53e0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-21246 is classified as a local escalation of privilege vulnerability.
To mitigate CVE-2023-21246, update your Android device to a patched version released by Google.
CVE-2023-21246 affects Android versions 11.0, 12.0, 12.1, and 13.0.
Yes, exploitation of CVE-2023-21246 does not require user interaction.
CVE-2023-21246 could allow an app to retain notification listening access, leading to local privilege escalation.