Vulnerability Description
In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to control other running activities due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | 11.0 |
Related Weaknesses (CWE)
References
- https://android.googlesource.com/platform/frameworks/base/+/f810d81839af38ee121cIssue TrackingPatch
- https://source.android.com/security/bulletin/2023-09-01Vendor Advisory
- https://android.googlesource.com/platform/frameworks/base/+/f810d81839af38ee121cIssue TrackingPatch
- https://source.android.com/security/bulletin/2023-09-01Vendor Advisory
FAQ
What is CVE-2023-35669?
CVE-2023-35669 is a vulnerability with a CVSS score of 7.8 (HIGH). In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to control other running activities due to unsafe deserialization. This could lead to local escalation of priv...
How severe is CVE-2023-35669?
CVE-2023-35669 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-35669?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.