Skip to main content

CVE-2023-21244: Elevation of privilege in Google Android

Medium
VulnerabilityCVE-2023-21244cvecve-2023-21244
Published: Fri Oct 06 2023 (10/06/2023, 18:48:40 UTC)
Source: CVE
Vendor/Project: Google
Product: Android

Description

In visitUris of Notification.java, there is a possible bypass of user profile boundaries due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 06/25/2025, 22:42:26 UTC

Technical Analysis

CVE-2023-21244 is a security vulnerability identified in the Android operating system, specifically affecting versions 11, 12, 12L, and 13. The flaw exists in the visitUris method of Notification.java, where a missing permission check allows a bypass of user profile boundaries. This vulnerability enables a local attacker with existing user execution privileges to escalate their privileges within the device. The key technical issue is that the code does not properly verify permissions when handling URIs in notifications, which can be exploited to cross user profile boundaries, potentially granting access to resources or data that should be restricted. Notably, exploitation does not require any user interaction, increasing the risk of automated or stealthy attacks. The vulnerability is classified under CWE-862 (Missing Authorization), indicating a failure to enforce proper authorization checks. The CVSS v3.1 base score is 6.7 (medium severity), with the vector AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires local access and high privileges but no user interaction, and can impact confidentiality, integrity, and availability significantly. No known exploits in the wild have been reported yet, and no official patches have been linked at the time of publication. This vulnerability could be leveraged by malicious local applications or threat actors who have gained limited access to an Android device to elevate their privileges and potentially compromise sensitive data or system integrity.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in environments where Android devices are used for sensitive operations, including corporate mobile devices, BYOD scenarios, and critical infrastructure management. The ability to escalate privileges locally without user interaction means that malware or malicious insiders could exploit this flaw to gain unauthorized access to confidential information, manipulate device settings, or disrupt availability of services. This could lead to data breaches, intellectual property theft, or operational disruptions. Given the widespread use of Android devices across European enterprises and public sectors, the vulnerability could affect a broad range of industries including finance, healthcare, government, and telecommunications. The impact is heightened in sectors where strict data protection regulations such as GDPR apply, as exploitation could lead to non-compliance and significant legal and financial penalties. Additionally, the vulnerability could be used as a foothold for further lateral movement within corporate networks if Android devices are connected to enterprise systems.

Mitigation Recommendations

To mitigate CVE-2023-21244, European organizations should prioritize the following actions: 1) Ensure all Android devices are updated to the latest available security patches from device manufacturers or Google as soon as they are released, as this vulnerability requires a patch to fully remediate. 2) Implement strict application control policies to limit installation of untrusted or unnecessary apps, reducing the risk of local privilege escalation by malicious apps. 3) Employ mobile device management (MDM) solutions to enforce security configurations, monitor device integrity, and restrict access to sensitive resources based on device compliance status. 4) Conduct regular security audits and vulnerability assessments on mobile endpoints to detect signs of exploitation or unauthorized privilege escalations. 5) Educate users about the risks of installing apps from unknown sources and the importance of device security hygiene. 6) For high-security environments, consider isolating Android devices from critical networks or limiting their access to sensitive systems to reduce potential lateral movement. 7) Monitor for unusual local activity or privilege escalations on Android devices using endpoint detection and response (EDR) tools tailored for mobile platforms. These measures go beyond generic advice by focusing on controlling local app behavior, enforcing patch management rigorously, and integrating mobile security into broader organizational risk management frameworks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2022-11-03T22:37:50.652Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec549

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/25/2025, 10:42:26 PM

Last updated: 8/7/2025, 11:05:21 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats