2023-10-29 09:06:41 +00:00
{
"id" : "CVE-2023-40120" ,
"sourceIdentifier" : "security@android.com" ,
"published" : "2023-10-27T21:15:08.667" ,
2023-10-30 19:00:28 +00:00
"lastModified" : "2023-10-30T17:13:13.680" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-10-29 09:06:41 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In multiple locations, there is a possible way to bypass user notification of foreground services due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
2023-10-30 19:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "En varias ubicaciones, existe una forma posible de omitir la notificaci\u00f3n al usuario de los servicios en primer plano debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "879FFD0C-9B38-4CAA-B057-1086D794D469"
}
]
}
]
2023-10-29 09:06:41 +00:00
}
] ,
"references" : [
{
"url" : "https://android.googlesource.com/platform/frameworks/base/+/d26544e5a4fd554b790b4d0c5964d9e95d9e626b" ,
2023-10-30 19:00:28 +00:00
"source" : "security@android.com" ,
"tags" : [
"Patch"
]
2023-10-29 09:06:41 +00:00
} ,
{
"url" : "https://source.android.com/security/bulletin/2023-10-01" ,
2023-10-30 19:00:28 +00:00
"source" : "security@android.com" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-10-29 09:06:41 +00:00
}
]
}