CVE-2023-21131Authorization Bypass Through User-Controlled Key in Google Android

Severity
7.8HIGHNVD
EPSS
0.0%
top 99.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 15

Description

In checkKeyIntentParceledCorrectly() of ActivityManagerService.java, there is a possible bypass of Parcel Mismatch mitigations due to a logic error in the code. This could lead to local escalation of privilege and the ability to launch arbitrary activities in settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-265015796

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

CVEListV5google/androidAndroid-11 Android-12 Android-12L Android-13
NVDgoogle/android4 versions+3
Androidplatform/frameworks_base13-next:013-next:2023-06-01+4

Patches

🔴Vulnerability Details

2
GHSA
GHSA-chh8-g4vh-2577: In checkKeyIntentParceledCorrectly() of ActivityManagerService2023-06-15
OSV
CVE-2023-21131: In checkKeyIntentParceledCorrectly() of ActivityManagerService2023-06-01

📋Vendor Advisories

1
Android
CVE-2023-21131: Android Security Bulletin 2023-06-01 CVE: CVE-2023-21131 Severity: HIGH Type: EoP Affected AOSP versions: 11, 12, 12L, 13 References: A-2650157962023-06-01