First published: Mon Oct 02 2023(Updated: )
In onCreate of ApnEditor.java, there is a possible way for a Guest user to change the APN due to a permission bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40125 is a vulnerability in the Android operating system that allows a Guest user to change the Access Point Name (APN) due to a permission bypass, potentially leading to local privilege escalation.
CVE-2023-40125 has a severity score of 7 (high).
CVE-2023-40125 affects Android versions 11.0, 12.0, 12.1, and 13.0.
No, user interaction is not needed for exploitation of CVE-2023-40125.
To fix CVE-2023-40125, update your Android device to the latest available security patch or firmware provided by your device manufacturer.