THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-31317

Assignergoogle_android
Reserved2024-03-29
Published2024-07-09
Updated2024-07-10

Description

In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITE_SECURE_SETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.

Problem types

Elevation of privilege

Product status

Default status
unaffected

14
affected

13
affected

12L
affected

12
affected

References

https://android.googlesource.com/platform/frameworks/base/+/e25a0e394bbfd6143a557e1019bb7ad992d11985

https://source.android.com/security/bulletin/2024-06-01

cve.org CVE-2024-31317

nvd.nist.gov CVE-2024-31317

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-31317
© Copyright 2024 THREATINT. Made in Cyprus with +