First published: Wed Sep 27 2023(Updated: )
The vulnerability is the use of implicit PendingIntents with the PendingIntent.FLAG_MUTABLE set that leads to theft and/or (over-)write of arbitrary files with system privilege in the Bluetooth ("com.lge.bluetoothsetting") app. The attacker's app, if it had access to app notifications, could intercept them and redirect them to its activity, before making it grant access permissions to content providers with the `android:grantUriPermissions="true"` flag.
Credit: product.security@lge.com product.security@lge.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =12.0 | |
Google Android | =13.0 | |
Lg V60 Thin Q 5g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44123 is a vulnerability in the Bluetooth app on Google Android and LG V60 Thin Q 5g devices that allows an attacker's app to steal or overwrite arbitrary files with system privileges.
CVE-2023-44123 affects Google Android versions 12.0 and 13.0, allowing an attacker's app to intercept app notifications and potentially steal or overwrite files with system privileges. LG V60 Thin Q 5g is not vulnerable to this specific issue.
CVE-2023-44123 has a severity rating of 7.8, which is considered high.
To mitigate CVE-2023-44123, users should update their Google Android devices to the latest available version and apply any patches or security updates provided by their device manufacturer.
More information about CVE-2023-44123 can be found in the LG Security Bulletins on the LG website.