First published: Tue Sep 05 2023(Updated: )
In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to control other running activities due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Google Android |
https://android.googlesource.com/platform/frameworks/base/+/f810d81839af38ee121c446105ca67cb12992fc6
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-35669.
The title of the vulnerability is 'In checkKeyIntentParceledCorrectly of AccountManagerService.java there is a possible way to control other running activities due to unsafe deserialization.'
The severity of CVE-2023-35669 is high with a severity value of 7.
Google Android versions 11.0, 12.0, 12.1, and 13.0 are affected by CVE-2023-35669.
CVE-2023-35669 can be exploited without user interaction.