CVE-2023-21131

In checkKeyIntentParceledCorrectly() of ActivityManagerService.java, there is a possible bypass of Parcel Mismatch mitigations due to a logic error in the code. This could lead to local escalation of privilege and the ability to launch arbitrary activities in settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-265015796
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*

History

18 Dec 2024, 19:15

Type Values Removed Values Added
CWE CWE-639

21 Nov 2024, 07:42

Type Values Removed Values Added
References () https://source.android.com/security/bulletin/2023-06-01 - Patch, Vendor Advisory () https://source.android.com/security/bulletin/2023-06-01 - Patch, Vendor Advisory

Information

Published : 2023-06-15 19:15

Updated : 2024-12-18 19:15


NVD link : CVE-2023-21131

Mitre link : CVE-2023-21131

CVE.ORG link : CVE-2023-21131


JSON object : View

Products Affected

google

  • android
CWE
NVD-CWE-noinfo CWE-639

Authorization Bypass Through User-Controlled Key