CVE Vulnerabilities

CVE-2023-20953

Published: Mar 24, 2023 | Modified: Feb 25, 2025
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In onPrimaryClipChanged of ClipboardListener.java, there is a possible way to bypass factory reset protection due to incorrect UI being shown prior to setup completion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-251778420

Affected Software

NameVendorStart VersionEnd Version
AndroidGoogle13.0 (including)13.0 (including)
Android-framework-23Ubuntubionic*
Android-framework-23Ubuntudevel*
Android-framework-23Ubuntuesm-apps/bionic*
Android-framework-23Ubuntuesm-apps/focal*
Android-framework-23Ubuntuesm-apps/jammy*
Android-framework-23Ubuntuesm-apps/noble*
Android-framework-23Ubuntufocal*
Android-framework-23Ubuntujammy*
Android-framework-23Ubuntukinetic*
Android-framework-23Ubuntulunar*
Android-framework-23Ubuntumantic*
Android-framework-23Ubuntunoble*
Android-framework-23Ubuntuoracular*
Android-framework-23Ubuntutrusty*
Android-framework-23Ubuntuxenial*
Android-platform-frameworks-baseUbuntubionic*
Android-platform-frameworks-baseUbuntudevel*
Android-platform-frameworks-baseUbuntuesm-apps/bionic*
Android-platform-frameworks-baseUbuntuesm-apps/focal*
Android-platform-frameworks-baseUbuntuesm-apps/jammy*
Android-platform-frameworks-baseUbuntuesm-apps/noble*
Android-platform-frameworks-baseUbuntuesm-apps/xenial*
Android-platform-frameworks-baseUbuntufocal*
Android-platform-frameworks-baseUbuntujammy*
Android-platform-frameworks-baseUbuntukinetic*
Android-platform-frameworks-baseUbuntulunar*
Android-platform-frameworks-baseUbuntumantic*
Android-platform-frameworks-baseUbuntunoble*
Android-platform-frameworks-baseUbuntuoracular*
Android-platform-frameworks-baseUbuntutrusty*
Android-platform-frameworks-baseUbuntuxenial*

References