CVE-2023-21131 — Authorization Bypass Through User-Controlled Key in Google Android
Severity
7.8HIGHNVD
EPSS
0.0%
top 99.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 15
Description
In checkKeyIntentParceledCorrectly() of ActivityManagerService.java, there is a possible bypass of Parcel Mismatch mitigations due to a logic error in the code. This could lead to local escalation of privilege and the ability to launch arbitrary activities in settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-265015796
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages4 packages
Patches
🔴Vulnerability Details
2📋Vendor Advisories
1Android▶
CVE-2023-21131: Android Security Bulletin 2023-06-01
CVE: CVE-2023-21131
Severity: HIGH
Type: EoP
Affected AOSP versions: 11, 12, 12L, 13
References: A-265015796↗2023-06-01