
Cloud Vulnerability DB
A community-led vulnerabilities database
In getCurrentState of OneTimePermissionUserManager.java, there is a possible way to hold one-time permissions after the app is being killed due to a logic error in the code. This vulnerability (CVE-2023-21254) affects Android 13.0 and was disclosed in the July 2023 Android Security Bulletin. The vulnerability could lead to local escalation of privilege with no additional execution privileges needed, and user interaction is not required for exploitation (Android Bulletin).
The vulnerability exists in the getCurrentState method of OneTimePermissionUserManager.java component. It involves a logic error that allows applications to retain one-time permissions even after the app process is terminated. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access, low attack complexity, low privileges required, and no user interaction needed (NVD).
The vulnerability can result in unauthorized escalation of privilege on the affected system. Successful exploitation could allow an attacker to maintain one-time permissions beyond their intended duration, potentially compromising the Android permission model's security guarantees (NVD).
Google has addressed this vulnerability with a patch that modifies how process states are checked. The fix involves using internal API to check process states instead of the binder method, which was affected by a bug that kept killed processes in the "pending top" list. The patch was implemented in the Android codebase and distributed through the July 2023 Android Security Bulletin (Android Source).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."