{"api_version":"1","generated_at":"2026-04-23T07:01:05+00:00","cve":"CVE-2023-20976","urls":{"html":"https://cve.report/CVE-2023-20976","api":"https://cve.report/api/cve/CVE-2023-20976.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-20976","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-20976"},"summary":{"title":"CVE-2023-20976","description":"In getConfirmationMessage of DefaultAutofillPicker.java, there is a possible way to mislead the user to select default autofill application due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-216117246","state":"PUBLIC","assigner":"security@android.com","published_at":"2023-03-24 20:15:00","updated_at":"2023-06-28 18:15:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"https://source.android.com/security/bulletin/pixel/2023-03-01","name":"https://source.android.com/security/bulletin/pixel/2023-03-01","refsource":"MISC","tags":[],"title":"Pixel Update Bulletin—March 2023  |  Android Open Source Project","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://source.android.com/security/bulletin/pixel/2023-06-01","name":"https://source.android.com/security/bulletin/pixel/2023-06-01","refsource":"MISC","tags":[],"title":"Pixel Update Bulletin—June 2023  |  Android Open Source Project","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-20976","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20976","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"20976","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"google","cpe5":"android","cpe6":"13.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-20976","qid":"610470","title":"Google Pixel Android March 2023 Security Patch Missing"},{"cve":"CVE-2023-20976","qid":"610491","title":"Google Pixel Android June 2023 Security Patch Missing"},{"cve":"CVE-2023-20976","qid":"610492","title":"Google Pixel Android July 2023 Security Patch Missing"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2023-20976","ASSIGNER":"security@android.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Android","version":{"version_data":[{"version_value":"Android-13"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Elevation of privilege"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://source.android.com/security/bulletin/pixel/2023-06-01","url":"https://source.android.com/security/bulletin/pixel/2023-06-01"}]},"description":{"description_data":[{"lang":"eng","value":"In getConfirmationMessage of DefaultAutofillPicker.java, there is a possible way to mislead the user to select default autofill application due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-216117246"}]}},"nvd":{"publishedDate":"2023-03-24 20:15:00","lastModifiedDate":"2023-06-28 18:15:00","problem_types":["CWE-20"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.3,"baseSeverity":"HIGH"},"exploitabilityScore":1.3,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}