Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-40130: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2023-40130cvecve-2023-40130
Published: Fri Oct 27 2023 (10/27/2023, 20:22:57 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In notifyTimeout of CallRedirectionProcessor, there is a possible permission bypass due to a logic error in the code. This could lead to local escalation of privilege and background activity launch with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 12/17/2025, 16:41:33 UTC

Technical Analysis

CVE-2023-40130 is a vulnerability identified in Google Android operating system versions 13, 14, 15, and 16, specifically within the CallRedirectionProcessor component's notifyTimeout function. The flaw is due to a logic error that causes a permission bypass, enabling a local attacker to escalate privileges without requiring additional execution privileges or user interaction. This means an attacker with local access to the device can exploit the vulnerability to launch background activities that normally would be restricted, potentially gaining unauthorized access to sensitive device functions or data. The vulnerability is classified as an elevation of privilege, which can compromise the confidentiality, integrity, and availability of the device. The CVSS v3.1 base score is 7.8, indicating high severity, with attack vector local (AV:L), attack complexity low (AC:L), privileges required low (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). Although no exploits have been reported in the wild yet, the vulnerability's characteristics make it a significant risk, especially in environments where devices are shared or exposed to potentially malicious local applications. The absence of user interaction requirement increases the risk of stealthy exploitation. The vulnerability was published on October 27, 2023, and is tracked under CVE-2023-40130. No official patch links were provided in the source data, but it is expected that Google will release updates to address this issue. Until patches are applied, affected devices remain vulnerable to local privilege escalation attacks.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises relying heavily on Android devices for business operations, including mobile workforce management, secure communications, and sensitive data access. Successful exploitation could allow attackers to bypass security controls, access confidential information, manipulate data integrity, or disrupt device availability by launching unauthorized background activities. This could lead to data breaches, espionage, or operational disruptions. The local attack vector implies that attackers need some form of local access, which could be achieved through malicious apps, insider threats, or physical access. Given the high Android market penetration across Europe, especially in countries with large mobile workforces and critical infrastructure sectors, the potential impact is broad. Additionally, the lack of user interaction requirement facilitates stealthy attacks, increasing the risk of unnoticed compromise. Organizations in regulated sectors such as finance, healthcare, and government are particularly vulnerable due to the sensitivity of the data handled on mobile devices.

Mitigation Recommendations

1. Apply official security patches from Google as soon as they become available to address CVE-2023-40130. 2. Restrict installation of applications from untrusted sources to minimize the risk of malicious local apps exploiting the vulnerability. 3. Employ Mobile Device Management (MDM) solutions to enforce security policies, monitor device behavior, and restrict background activity launches where possible. 4. Conduct regular security audits and behavioral monitoring on Android devices to detect unusual background processes or privilege escalations. 5. Educate users about the risks of installing unauthorized applications and the importance of device security hygiene. 6. For highly sensitive environments, consider implementing additional endpoint protection solutions capable of detecting privilege escalation attempts. 7. Limit physical access to devices to prevent exploitation via local access. 8. Monitor threat intelligence feeds for any emerging exploits targeting this vulnerability to respond promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2023-08-09T02:29:33.869Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6937058652c2eb5957f2f195

Added to database: 12/8/2025, 5:06:14 PM

Last enriched: 12/17/2025, 4:41:33 PM

Last updated: 1/29/2026, 6:23:52 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats