In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITE_SECURE_SETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
History

Tue, 17 Dec 2024 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
CPEs cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
Vendors & Products Google
Google android

cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published: 2024-07-09T20:09:15.933Z

Updated: 2024-08-02T01:52:56.288Z

Reserved: 2024-03-29T20:11:33.058Z

Link: CVE-2024-31317

cve-icon Vulnrichment

Updated: 2024-08-02T01:52:56.288Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-09T21:15:13.197

Modified: 2024-12-17T17:19:27.063

Link: CVE-2024-31317

cve-icon Redhat

No data.