First published: Wed Sep 27 2023(Updated: )
The vulnerability is to theft of arbitrary files with system privilege in the LockScreenSettings ("com.lge.lockscreensettings") app in the "com/lge/lockscreensettings/dynamicwallpaper/MyCategoryGuideActivity.java" file. The main problem is that the app launches implicit intents that can be intercepted by third-party apps installed on the same device. They also can return arbitrary data that will be passed to the "onActivityResult()" method. The LockScreenSettings app copies the received file to the "/data/shared/dw/mycategory/wallpaper_01.png" path and then changes the file access mode to world-readable and world-writable.
Credit: product.security@lge.com product.security@lge.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =12.0 | |
Google Android | =13.0 | |
Lg V60 Thin Q 5g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44122 is a vulnerability in the LockScreenSettings app that allows theft of arbitrary files with system privileges.
The affected software versions are Google Android 12.0 and 13.0.
The severity of CVE-2023-44122 is high with a severity value of 7.8.
The CVE-2023-44122 vulnerability can be exploited by intercepting implicit intents launched by the LockScreenSettings app.
No, the Lg V60 Thin Q 5g is not vulnerable to CVE-2023-44122.