Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for privilege escalation. Depending on the privileges associated with the exploited component, an attacker could then install programs; view, change, or delete data; or create new accounts with full rights.
THREAT INTELLIGENCE:
There are currently no reports of these vulnerabilities being exploited in the wild.
SYSTEMS AFFECTED:
RISK:
Government:
Businesses:
Home users: Low
TECHNICAL SUMMARY:
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation in the context of the affected component. Following the MITRE ATT&CK framework, exploitation of these vulnerabilities can be classified as follows:
Tactic: Privilege Escalation (TA0004)
Technique: Exploitation for Privilege Escalation (T1068):
Details of lower-severity vulnerabilities are as follows:
Successful exploitation of the most severe of these vulnerabilities could allow for privilege escalation. Depending on the privileges associated with the exploited component, an attacker could then install programs; view, change, or delete data; or create new accounts with full rights.
RECOMMENDATIONS:
We recommend the following actions be taken:
1. Apply appropriate patches provided by Google to vulnerable systems, immediately after appropriate testing. (M1051: Update Software)
2. Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources. Inform and educate users regarding threats posed by hypertext links contained in emails or attachments, especially from un-trusted sources. (M1017: User Training)
REFERENCES:
Google:https://source.android.com/docs/security/bulletin/2023-02-01
CVE:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33306
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47339
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20948