CVE-2023-21343

7.8 HIGH

📋 TL;DR

This vulnerability in Android's ActivityStarter component allows malicious apps to launch background activities without user interaction through an unsafe PendingIntent. This could enable local privilege escalation, potentially allowing attackers to gain elevated permissions. All Android devices running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Android
Versions: Android versions before Android 14 (specifically before 2023-10-01 security patch level)
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All Android devices with vulnerable versions are affected regardless of configuration. The vulnerability is in the Android framework itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise with attacker gaining system-level privileges, accessing sensitive data, and installing persistent malware.

🟠

Likely Case

Limited privilege escalation allowing access to other app data and system resources beyond the attacker's original permissions.

🟢

If Mitigated

No impact if patched; otherwise, risk depends on device configuration and installed apps.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring app installation, not directly exploitable over network.
🏢 Internal Only: HIGH - Once a malicious app is installed (via social engineering or other means), exploitation requires no user interaction and can happen automatically.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires a malicious app to be installed on the device first. Once installed, no user interaction is needed for exploitation according to the description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android 14 (October 2023 security patch level or later)

Vendor Advisory: https://source.android.com/docs/security/bulletin/android-14

Restart Required: Yes

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Install Android 14 or October 2023 security patch. 3. Reboot device after installation.

🔧 Temporary Workarounds

Disable unknown sources

android

Prevent installation of apps from unknown sources to reduce risk of malicious app installation

Use Google Play Protect

android

Enable Google Play Protect to scan for malicious apps

🧯 If You Can't Patch

  • Restrict app installations to trusted sources only (Google Play Store)
  • Implement mobile device management (MDM) with app whitelisting and regular security audits

🔍 How to Verify

Check if Vulnerable:

Check Android version in Settings > About phone > Android version. If version is below 14 or security patch level is before October 2023, device is vulnerable.

Check Version:

Settings navigation only - no command line available for standard users

Verify Fix Applied:

Verify Android version is 14 or later, and security patch level is October 2023 or newer in Settings > About phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual ActivityStarter intents from untrusted apps
  • Privilege escalation attempts in system logs

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

Not typically applicable for mobile device logs in enterprise SIEMs

🔗 References

📤 Share & Export