In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITE_SECURE_SETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Dec 2024 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Google
Google android |
|
CPEs | cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Google
Google android |

Status: PUBLISHED
Assigner: google_android
Published: 2024-07-09T20:09:15.933Z
Updated: 2024-08-02T01:52:56.288Z
Reserved: 2024-03-29T20:11:33.058Z
Link: CVE-2024-31317

Updated: 2024-08-02T01:52:56.288Z

Status : Analyzed
Published: 2024-07-09T21:15:13.197
Modified: 2024-12-17T17:19:27.063
Link: CVE-2024-31317

No data.