First published: Mon Jan 06 2025(Updated: )
In setActualDefaultRingtoneUri of RingtoneManager.java, there is a possible way to bypass content providers read permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 | |
Android | =14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40132 has been classified as a medium-severity vulnerability.
To fix CVE-2023-40132, ensure that your Android version is updated to the latest security patch provided by Google.
CVE-2023-40132 allows local escalation of privilege due to a missing permission check in the RingtoneManager.
Yes, user interaction is needed for exploiting CVE-2023-40132.
CVE-2023-40132 affects various versions of Android, particularly those that do not have the latest security updates.