First published: Mon Oct 02 2023(Updated: )
In resetSettingsLocked of SettingsProvider.java, there is a possible lockscreen bypass due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 |
https://android.googlesource.com/platform/frameworks/base/+/ff86ff28cf82124f8e65833a2dd8c319aea08945
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-40117.
CVE-2023-40117 is classified as a high severity vulnerability.
The affected software is Google Android versions 11.0, 12.0, 12.1, and 13.0.
The root cause of CVE-2023-40117 is a permissions bypass in the resetSettingsLocked function of SettingsProvider.java.
No, user interaction is not needed for exploitation of CVE-2023-40117.