First published: Mon Dec 04 2023(Updated: )
In fixUpIncomingShortcutInfo of ShortcutService.java, there is a possible way to view another user's image due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Google Android | =14.0 |
https://android.googlesource.com/platform/frameworks/base/+/f229f0e55b07416badaca0e3493db5af0943c9eb
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45774 is a vulnerability in the fixUpIncomingShortcutInfo function of ShortcutService.java in Google Android that allows an attacker to view another user's image and potentially escalate privileges.
CVE-2023-45774 has a high severity rating of 7.
CVE-2023-45774 works by exploiting a confused deputy in the fixUpIncomingShortcutInfo function, which allows an attacker to view another user's image and potentially escalate privileges.
No, user interaction is not needed for exploitation of CVE-2023-45774.
To fix CVE-2023-45774, it is recommended to apply the patches provided by Google in the security bulletin for December 2023.