
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-21281 affects multiple functions in KeyguardViewMediator.java of Android operating systems. The vulnerability was discovered and reported to Android (associated with Google Inc. or Open Handset Alliance) and was publicly disclosed in the August 2023 Android Security Bulletin. The vulnerability affects Android versions 11.0, 12.0, 12.1, and 13.0 (Android Bulletin).
The vulnerability stems from a logic error in the code of KeyguardViewMediator.java that could result in a failure to lock after screen timeout. The issue has been assigned a CVSS v3.1 Base Score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access is required but the vulnerability is easily exploitable with low complexity (NVD).
A successful exploitation of this vulnerability could lead to local escalation of privilege across users. The high CVSS score indicates that the vulnerability can potentially result in complete compromise of confidentiality, integrity, and availability of the affected system (NVD).
Google has released a patch for this vulnerability in the August 2023 Android Security Bulletin. The fix involves modifying the KeyguardViewMediator.java to use Settings.System.getIntForUser instead of getInt to ensure user-specific settings are properly used (Android Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."