
Cloud Vulnerability DB
A community-led vulnerabilities database
In onCreate of ManagePermissionsActivity.java, there is a possible way to bypass factory reset protections due to a missing permission check. The vulnerability (CVE-2023-21132) affects Android versions 12.0, 12.1, and 13.0. This security issue was disclosed in the Android Security Bulletin of August 2023 (Android Bulletin).
The vulnerability is classified as a Missing Authorization issue (CWE-862) with a CVSS v3.1 base score of 6.8 MEDIUM (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The vulnerability exists in the ManagePermissionsActivity component and allows bypassing factory reset protections when the device is not properly provisioned (Android Patch).
Successful exploitation could lead to local escalation of privilege with physical access to a device that's been factory reset. The vulnerability can be exploited without additional execution privileges and requires no user interaction (NVD).
The vulnerability has been patched in the August 2023 Android Security Update. Users should update their Android devices to the latest security patch level. The fix involves completing the ManagePermissionsActivity if the device is not provisioned (Android Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."