Vulnerability Description
In the APEX module framework of AOSP, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. More details on this can be found in the referenced links.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | - |
References
- https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-wmc
- https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys
- https://source.android.com/security/bulletin/2023-12-01Vendor Advisory
- https://www.fairphone.com/en/2024/01/30/security-update-apex-modules-vulnerabili
- https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-wmc
- https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys
- https://source.android.com/security/bulletin/2023-12-01Vendor Advisory
- https://www.fairphone.com/en/2024/01/30/security-update-apex-modules-vulnerabili
FAQ
What is CVE-2023-45779?
CVE-2023-45779 is a vulnerability with a CVSS score of 7.8 (HIGH). In the APEX module framework of AOSP, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional exe...
How severe is CVE-2023-45779?
CVE-2023-45779 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-45779?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.