CVE-2023-21247

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to bypass device policy restrictions for Bluetooth scanning without proper permission checks. It enables local privilege escalation on affected Android devices without requiring user interaction. Only Android devices with vulnerable Settings app versions are affected.

💻 Affected Systems

Products:
  • Android Settings application
Versions: Android versions prior to July 2023 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with vulnerable Settings app where Bluetooth scanning restrictions are configured via device policy.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access or malicious app could gain elevated privileges, potentially accessing restricted device features or sensitive data normally protected by device policies.

🟠

Likely Case

Malicious apps could bypass Bluetooth scanning restrictions to perform unauthorized device discovery or connection attempts without user knowledge.

🟢

If Mitigated

With proper Android security updates applied, the vulnerability is completely patched with no residual risk.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access or malicious app execution.
🏢 Internal Only: MEDIUM - Internal users with malicious apps or physical access could exploit this to bypass device restrictions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access or malicious app installation. No user interaction needed once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2023 Android Security Patch or later

Vendor Advisory: https://source.android.com/security/bulletin/2023-07-01

Restart Required: Yes

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Install July 2023 or later security patch. 3. Reboot device after installation.

🔧 Temporary Workarounds

Disable Bluetooth scanning via policy

android

Configure device policy to disable Bluetooth scanning features entirely

Restrict app installation

android

Use Android Enterprise or MDM solutions to restrict installation of untrusted applications

🧯 If You Can't Patch

  • Implement strict mobile device management (MDM) policies to control app installation and device features
  • Monitor for unusual Bluetooth scanning activity or policy bypass attempts

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version > Security patch level. If before July 2023, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows July 2023 or later date. Test Bluetooth scanning restrictions via device policy to ensure they are enforced.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized Bluetooth scanning attempts
  • Device policy restriction bypass logs
  • Settings app permission violation events

Network Indicators:

  • Unexpected Bluetooth discovery or pairing attempts from restricted devices

SIEM Query:

source="android_logs" AND (event="bluetooth_scan_bypass" OR event="policy_violation" AND component="Settings")

🔗 References

📤 Share & Export