CVE-2023-21267

In multiple functions of KeyguardViewMediator.java, there is a possible way to bypass lockdown mode with screen pinning due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*
cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*

History

07 May 2024, 21:15

Type Values Removed Values Added
Summary In doKeyguardLocked of KeyguardViewMediator.java, there is a possible way to bypass lockdown mode with screen pinning due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. In multiple functions of KeyguardViewMediator.java, there is a possible way to bypass lockdown mode with screen pinning due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
References
  • {'url': 'https://android.googlesource.com/platform/frameworks/base/+/d18d8b350756b0e89e051736c1f28744ed31e93a', 'name': 'https://android.googlesource.com/platform/frameworks/base/+/d18d8b350756b0e89e051736c1f28744ed31e93a', 'tags': ['Patch'], 'refsource': 'MISC'}
  • {'url': 'https://source.android.com/security/bulletin/2023-08-01', 'name': 'https://source.android.com/security/bulletin/2023-08-01', 'tags': ['Patch', 'Vendor Advisory'], 'refsource': 'MISC'}
  • () https://android.googlesource.com/platform/frameworks/base/+/cecddcd865f72d76f7aacb1cf4479365847299f9 -
  • () https://source.android.com/security/bulletin/2024-04-01 -
  • () https://android.googlesource.com/platform/frameworks/base/+/cb7e9c7549a2a076ec00db15e3da0d21b31b0b1c -
  • () https://android.googlesource.com/platform/frameworks/base/+/e205cd30e91d8eeadf562140c34c306ebf7d6394 -

24 Aug 2023, 14:21

Type Values Removed Values Added
References (MISC) https://android.googlesource.com/platform/frameworks/base/+/d18d8b350756b0e89e051736c1f28744ed31e93a - (MISC) https://android.googlesource.com/platform/frameworks/base/+/d18d8b350756b0e89e051736c1f28744ed31e93a - Patch
References (MISC) https://source.android.com/security/bulletin/2023-08-01 - (MISC) https://source.android.com/security/bulletin/2023-08-01 - Patch, Vendor Advisory
CPE cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*
cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*
First Time Google android
Google
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

14 Aug 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-14 21:15

Updated : 2024-07-03 01:39


NVD link : CVE-2023-21267

Mitre link : CVE-2023-21267


JSON object : View

Products Affected

google

  • android