CVE-2023-40125Packages Apps Settings vulnerability

5 documents5 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 99.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 27

Description

In onCreate of ApnEditor.java, there is a possible way for a Guest user to change the APN due to a permission bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

Androidplatform/packages_apps_settings14-next:014-next:2023-10-01+4
CVEListV5google/android4 versions+3
NVDgoogle/android4 versions+3

Patches

🔴Vulnerability Details

3
CVEList
CVE-2023-40125: In onCreate of ApnEditor2023-10-27
GHSA
GHSA-h9p2-g8w7-8363: In onCreate of ApnEditor2023-10-27
OSV
CVE-2023-40125: In onCreate of ApnEditor2023-10-01

📋Vendor Advisories

1
Android
CVE-2023-40125: Android Security Bulletin 2023-10-01 CVE: CVE-2023-40125 Severity: HIGH Type: EoP Affected AOSP versions: 11, 12, 12L, 13 References: A-2799024722023-10-01
CVE-2023-40125 — Packages Apps Settings vulnerability | cvebase