CVE-2023-40120

In multiple locations, there is a possible way to bypass user notification of foreground services due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:18

Type Values Removed Values Added
References () https://android.googlesource.com/platform/frameworks/base/+/d26544e5a4fd554b790b4d0c5964d9e95d9e626b - Patch () https://android.googlesource.com/platform/frameworks/base/+/d26544e5a4fd554b790b4d0c5964d9e95d9e626b - Patch
References () https://source.android.com/security/bulletin/2023-10-01 - Patch, Vendor Advisory () https://source.android.com/security/bulletin/2023-10-01 - Patch, Vendor Advisory

30 Oct 2023, 17:13

Type Values Removed Values Added
References (MISC) https://android.googlesource.com/platform/frameworks/base/+/d26544e5a4fd554b790b4d0c5964d9e95d9e626b - (MISC) https://android.googlesource.com/platform/frameworks/base/+/d26544e5a4fd554b790b4d0c5964d9e95d9e626b - Patch
References (MISC) https://source.android.com/security/bulletin/2023-10-01 - (MISC) https://source.android.com/security/bulletin/2023-10-01 - Patch, Vendor Advisory
First Time Google
Google android
CPE cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

27 Oct 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-27 21:15

Updated : 2024-11-21 08:18


NVD link : CVE-2023-40120

Mitre link : CVE-2023-40120

CVE.ORG link : CVE-2023-40120


JSON object : View

Products Affected

google

  • android