Skip to main content

CVE-2023-35670: Elevation of privilege in Google Android

High
VulnerabilityCVE-2023-35670cvecve-2023-35670
Published: Mon Sep 11 2023 (09/11/2023, 20:09:52 UTC)
Source: CVE
Vendor/Project: Google
Product: Android

Description

In computeValuesFromData of FileUtils.java, there is a possible way to insert files to other apps' external private directories due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 07/03/2025, 07:25:23 UTC

Technical Analysis

CVE-2023-35670 is a high-severity local privilege escalation vulnerability affecting multiple versions of the Google Android operating system, specifically versions 11, 12, 12L, and 13. The vulnerability arises from a path traversal flaw in the computeValuesFromData function within the FileUtils.java component. This flaw allows an attacker to insert files into the external private directories of other applications by manipulating file paths. Because these directories are intended to be private and isolated per app, unauthorized file insertion can lead to significant security breaches. Exploitation of this vulnerability does not require user interaction, nor does it require the attacker to have elevated execution privileges beyond a limited local privilege level. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), indicating that the software fails to properly sanitize or validate file path inputs, enabling directory traversal attacks. The CVSS v3.1 base score is 7.8, reflecting high severity with impacts on confidentiality, integrity, and availability (all rated high). The attack vector is local (AV:L), requiring low complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). This means an attacker with limited local access can exploit the flaw to escalate privileges on the device. No known exploits are currently reported in the wild, and no official patches have been linked yet. However, given the nature of the vulnerability and the widespread use of affected Android versions, this represents a significant risk if weaponized.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for enterprises and government agencies relying on Android devices for sensitive communications and operations. The ability to insert files into other apps' private directories can lead to unauthorized data access, data corruption, or the deployment of malicious payloads that compromise app integrity and user data confidentiality. This could facilitate lateral movement within devices, data exfiltration, or persistent malware installation. Given that user interaction is not required, the attack can be automated or triggered silently, increasing the risk of unnoticed compromise. Organizations with Bring Your Own Device (BYOD) policies or those deploying Android devices in critical infrastructure environments are particularly vulnerable. The vulnerability could also undermine mobile device management (MDM) controls and app sandboxing, weakening overall endpoint security. The lack of known exploits currently provides a window for proactive mitigation, but the high severity score and broad version impact necessitate urgent attention to prevent potential exploitation.

Mitigation Recommendations

European organizations should prioritize the following specific mitigation steps: 1) Immediate inventory and identification of Android devices running affected versions (11, 12, 12L, 13) within their environment. 2) Apply official security patches from Google or device manufacturers as soon as they become available; monitor Android security bulletins and vendor advisories closely. 3) Restrict local access to devices by enforcing strong device lock policies, disabling unnecessary debugging interfaces (e.g., ADB), and limiting physical access to trusted personnel only. 4) Employ mobile threat defense (MTD) solutions capable of detecting anomalous file system activities or unauthorized file insertions. 5) Enforce strict app installation policies, including the use of app whitelisting and verification of app signatures to prevent malicious apps from exploiting the vulnerability. 6) Educate users about the risks of installing untrusted applications or connecting devices to untrusted networks. 7) For high-security environments, consider deploying endpoint detection and response (EDR) tools with mobile capabilities to monitor for suspicious behaviors related to file system manipulation. 8) Implement network segmentation and zero-trust principles to limit the impact of compromised devices. These measures, combined with timely patching, will reduce the attack surface and mitigate exploitation risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2023-06-15T02:50:29.819Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbebe7f

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 7/3/2025, 7:25:23 AM

Last updated: 8/5/2025, 12:33:31 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats