CVE-2024-0044
Severity CVSS v4.0:
Pending analysis
Type:
CWE-74
Injection
Publication date:
11/03/2024
Last modified:
28/01/2025
Description
In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Impact
Base Score 3.x
6.70
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://android.googlesource.com/platform/frameworks/base/+/836750619a8bce0bf78fe0549f9990e294671563
- https://android.googlesource.com/platform/frameworks/base/+/954b2874b85b6cd0d6bb12cd677cdf22e5dbd77b
- https://source.android.com/security/bulletin/2024-10-01
- https://android.googlesource.com/platform/frameworks/base/+/65bd134b0a82c51a143b89821d5cdd00ddc31792
- https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fh-f3w4-r6v2
- https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html
- https://source.android.com/security/bulletin/2024-03-01