We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-31318



Description

In CompanionDeviceManagerService.java, there is a possible way to pair a companion device without user acceptance due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Reserved 2024-03-29 | Published 2024-07-09 | Updated 2024-08-02 | Assigner google_android

Problem types

Elevation of privilege

Product status

Default status
unaffected

14
affected

13
affected

12L
affected

12
affected

References

android.googlesource.com/...56a8600d53b4d2d06fb82aa44086a4a5

source.android.com/security/bulletin/2024-06-01

cve.org (CVE-2024-31318)

nvd.nist.gov (CVE-2024-31318)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-31318

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.