CVE-2023-21145

7.8 HIGH

📋 TL;DR

This vulnerability allows malicious Android apps to bypass background launch restrictions, enabling them to start activities without user interaction. This could lead to local privilege escalation where an app gains unauthorized access to system functions. All Android devices running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Android
Versions: Android versions prior to the July 2023 security update
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All Android devices with vulnerable versions are affected regardless of manufacturer modifications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain elevated system privileges, potentially accessing sensitive data, installing malware, or taking full control of the device.

🟠

Likely Case

Malicious apps could abuse this to run in the background without user knowledge, performing unauthorized actions or accessing restricted functionality.

🟢

If Mitigated

With proper app sandboxing and security updates, the impact is limited to isolated app compromise without system-wide effects.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring app installation, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Once a malicious app is installed (even from official stores), it can exploit this without user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a malicious app to be installed but no user interaction after installation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2023 Android Security Update

Vendor Advisory: https://source.android.com/security/bulletin/2023-07-01

Restart Required: Yes

Instructions:

1. Check for Android system updates in Settings > System > System Update. 2. Install the July 2023 security update. 3. Restart the device after installation.

🔧 Temporary Workarounds

Disable Picture-in-Picture for untrusted apps

android

Prevent apps from using Picture-in-Picture mode which could reduce attack surface

Restrict app installations

android

Only install apps from trusted sources like Google Play Store with Play Protect enabled

🧯 If You Can't Patch

  • Monitor for suspicious app behavior and background activity
  • Use mobile device management (MDM) solutions to restrict app permissions and monitor for anomalies

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About Phone > Android version. If before July 2023, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows 'July 5, 2023' or later in Settings > About Phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual background activity launches, especially involving Picture-in-Picture mode
  • Apps requesting permissions they shouldn't have based on their functionality

Network Indicators:

  • Unusual network traffic from apps running in background

SIEM Query:

Search for: 'ActivityRecord' AND 'PictureInPicture' AND 'background launch' in Android system logs

🔗 References

📤 Share & Export