First published: Mon Oct 02 2023(Updated: )
In multiple locations, there is a possible way to bypass user notification of foreground services due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 |
https://android.googlesource.com/platform/frameworks/base/+/d26544e5a4fd554b790b4d0c5964d9e95d9e626b
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-40120 is high.
CVE-2023-40120 affects Google Android versions 11.0, 12.0, 12.1, and 13.0.
No, user interaction is not needed for exploitation of CVE-2023-40120.
To fix CVE-2023-40120, apply the security patches provided by Google for affected Android versions.
The CWE of CVE-2023-40120 is 20.