In SettingsHomepageActivity.java, there is a possible way to launch arbitrary activities via Settings due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CVE-2023-21256 - High Severity Vulnerability
Vulnerable Library - Settingsandroid-10.0.0_r44
Library home page: https://android.googlesource.com/platform/packages/apps/Settings
Found in HEAD commit: a353664da30a0b95adee9281a4af5c1d5cacc22e
Found in base branch: master
Vulnerable Source Files (1)
/src/com/android/settings/homepage/SettingsHomepageActivity.java
Vulnerability Details
In SettingsHomepageActivity.java, there is a possible way to launch arbitrary activities via Settings due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
Publish Date: 2023-07-13
URL: CVE-2023-21256
CVSS 3 Score Details (7.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-21256
Release Date: 2023-07-12
Fix Resolution: android-13.0.0_r57
Step up your Open Source Security Game with Mend here