CVE-2023-20957

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to bypass Factory Reset Protection (FRP) on Android devices, potentially gaining elevated privileges without user interaction. It affects Android 11, 12, and 12L devices. The exploit leverages a confused deputy issue in the SettingsPreferenceFragment component.

💻 Affected Systems

Products:
  • Android
Versions: Android 11, 12, and 12L
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected Android versions are vulnerable unless patched. Factory Reset Protection must be enabled for the vulnerability to be relevant.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains persistent access to device after factory reset, bypassing security protections and potentially accessing sensitive data or installing malware.

🟠

Likely Case

Local attacker bypasses FRP to gain unauthorized access to a device, potentially stealing data or installing malicious apps.

🟢

If Mitigated

With proper patching, the vulnerability is eliminated; without patching, physical access controls and device encryption limit impact.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring physical or local access to the device.
🏢 Internal Only: MEDIUM - In enterprise environments, devices could be compromised by malicious insiders or through physical access scenarios.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the device. No public exploit code is known, but the vulnerability is documented in Android security bulletins.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Bulletin March 2023 patches

Vendor Advisory: https://source.android.com/security/bulletin/2023-03-01

Restart Required: Yes

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Install the March 2023 security patch or later. 3. Reboot the device after installation.

🔧 Temporary Workarounds

Disable Developer Options

android

Prevents potential exploitation vectors by disabling developer options which might be used in conjunction with this vulnerability.

Settings > System > Developer options > Toggle off

Enable Full Disk Encryption

android

Encrypts device storage to protect data even if FRP is bypassed.

Settings > Security > Encryption & credentials > Encrypt phone

🧯 If You Can't Patch

  • Restrict physical access to devices through physical security controls
  • Implement mobile device management (MDM) to enforce security policies and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check Android version in Settings > About phone > Android version. If version is 11, 12, or 12L without March 2023 patches, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.release

Verify Fix Applied:

Verify Android security patch level in Settings > About phone > Android security patch level. Ensure date is March 2023 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual factory reset attempts in system logs
  • SettingsPreferenceFragment crash logs

Network Indicators:

  • None - this is a local exploit

SIEM Query:

Search for event logs containing 'FactoryReset' or 'SettingsPreferenceFragment' anomalies on Android devices

🔗 References

📤 Share & Export