CVE-2023-40132
Published: 21 January 2025
Description
In setActualDefaultRingtoneUri of RingtoneManager.java, there is a possible way to bypass content providers read permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
Security Summary
CVE-2023-40132 is a vulnerability in the setActualDefaultRingtoneUri method of RingtoneManager.java within the Android framework. It stems from a missing permission check that allows bypassing content provider read permissions, classified under CWE-276 (Incorrect Default Permissions). The issue carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-01-21.
A local attacker with low privileges can exploit this vulnerability to achieve escalation of privilege without needing additional execution privileges. Although the CVSS vector indicates no user interaction (UI:N), the description specifies that user interaction is required for exploitation. Successful exploitation grants high confidentiality, integrity, and availability impacts.
The Android Security Bulletin at https://source.android.com/security/bulletin/2025-01-01 provides details on patches and mitigation steps for affected Android versions. Security practitioners should apply these updates promptly to address the permission bypass.
Details
- CWE(s)