In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITE_SECURE_SETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: google_android
Published: 2024-07-09T20:09:15.933Z
Updated: 2024-08-02T01:52:56.288Z
Reserved: 2024-03-29T20:11:33.058Z
Link: CVE-2024-31317
Vulnrichment
Updated: 2024-08-02T01:52:56.288Z
NVD
Status : Awaiting Analysis
Published: 2024-07-09T21:15:13.197
Modified: 2024-07-11T15:05:39.587
Link: CVE-2024-31317
Redhat
No data.