{"uuid": "f10950dd-b81a-4bb4-9dff-33702d441dc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40117", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13911", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-40117\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In resetSettingsLocked of SettingsProvider.java, there is a possible lockscreen bypass due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2023-10-27T20:22:56.374Z\n\ud83d\udccf Modified: 2025-04-29T19:59:46.887Z\n\ud83d\udd17 References:\n1. https://android.googlesource.com/platform/packages/apps/Settings/+/11815817de2f2d70fe842b108356a1bc75d44ffb\n2. https://android.googlesource.com/platform/frameworks/base/+/ff86ff28cf82124f8e65833a2dd8c319aea08945\n3. https://source.android.com/security/bulletin/2023-10-01", "creation_timestamp": "2025-04-29T20:12:32.000000Z"}