{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-44123","assignerOrgId":"42f21055-226c-4bce-a3c8-ecf55a3551fb","state":"PUBLISHED","assignerShortName":"LGE","dateReserved":"2023-09-26T05:57:13.269Z","datePublished":"2023-09-27T13:52:57.933Z","dateUpdated":"2024-09-20T19:52:54.896Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"LG V60 Thin Q 5G(LMV600VM)","vendor":"LG Electronics","versions":[{"status":"affected","version":"Android 12, 13"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The vulnerability is the use of implicit PendingIntents with the PendingIntent.FLAG_MUTABLE set that leads to theft and/or (over-)write of arbitrary files with system privilege in the Bluetooth (\"com.lge.bluetoothsetting\") app. The attacker's app, if it had access to app notifications, could intercept them and redirect them to its activity, before making it grant access permissions to content providers with the `android:grantUriPermissions=\"true\"` flag. "}],"value":"The vulnerability is the use of implicit PendingIntents with the PendingIntent.FLAG_MUTABLE set that leads to theft and/or (over-)write of arbitrary files with system privilege in the Bluetooth (\"com.lge.bluetoothsetting\") app. The attacker's app, if it had access to app notifications, could intercept them and redirect them to its activity, before making it grant access permissions to content providers with the `android:grantUriPermissions=\"true\"` flag. "}],"impacts":[{"capecId":"CAPEC-234","descriptions":[{"lang":"en","value":"CAPEC-234 Hijacking a privileged process"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":6.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-285","description":"CWE-285 Improper Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"42f21055-226c-4bce-a3c8-ecf55a3551fb","shortName":"LGE","dateUpdated":"2023-09-27T13:52:57.933Z"},"references":[{"tags":["vendor-advisory"],"url":"https://lgsecurity.lge.com/bulletins/mobile#updateDetails"}],"source":{"discovery":"UNKNOWN"},"title":"Bluetooth - Theft and (over-)write of arbitrary files with system privilege via PendingIntent hijacking","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T19:59:51.614Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://lgsecurity.lge.com/bulletins/mobile#updateDetails"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-20T18:34:28.354648Z","id":"CVE-2023-44123","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-20T19:52:54.896Z"}}]}}