CVE-2023-20975

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to bypass DISALLOW_CONTENT_CAPTURE restrictions on Android devices, potentially enabling unauthorized content capture. It affects Android 13 devices and requires no user interaction for exploitation, making it particularly dangerous for devices with multiple users or managed profiles.

💻 Affected Systems

Products:
  • Android
Versions: Android 13
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All Android 13 devices are affected unless specifically patched. Devices with multiple user profiles or managed devices are particularly at risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access or malicious app could capture sensitive screen content, access private data, and potentially escalate privileges to perform unauthorized actions on the device.

🟠

Likely Case

Malicious apps could bypass content capture restrictions to monitor user activity, capture sensitive information, and violate privacy policies on managed devices.

🟢

If Mitigated

With proper security policies and device management, the impact is limited to potential privacy violations rather than full system compromise.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the device.
🏢 Internal Only: HIGH - The vulnerability affects all Android 13 devices and can be exploited by malicious apps or users with physical access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but no user interaction. The vulnerability is in the permission validation logic, making exploitation straightforward for attackers with basic Android development knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Patch Level 2023-06-01 or later

Vendor Advisory: https://source.android.com/security/bulletin/pixel/2023-06-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > System update. 2. Install the June 2023 Android security patch. 3. Restart the device after installation. 4. Verify the patch level in Settings > About phone > Android version.

🔧 Temporary Workarounds

Disable Content Capture Feature

android

Disable the content capture feature system-wide to prevent exploitation

adb shell settings put secure content_capture_enabled 0

Restrict App Installations

android

Only allow installation of apps from trusted sources and implement application allowlisting

🧯 If You Can't Patch

  • Implement strict application control policies to prevent installation of untrusted apps
  • Use Android Enterprise or similar MDM solutions to enforce security policies and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check Android version and security patch level in Settings > About phone > Android version. If security patch level is before June 2023, the device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify the security patch level shows '2023-06-01' or later in Settings > About phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected content capture service activations
  • Permission bypass attempts in system logs
  • Unauthorized access to content capture APIs

Network Indicators:

  • Unusual data exfiltration patterns from content capture services

SIEM Query:

source="android_system_logs" AND (event="content_capture_bypass" OR permission="DISALLOW_CONTENT_CAPTURE")

🔗 References

📤 Share & Export