Description
In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITE_SECURE_SETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
Published: 2024-07-09
Score: 7.8 High
EPSS: 7.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.06128}

epss

{'score': 0.07032}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0609}

epss

{'score': 0.06128}


Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.04971}

epss

{'score': 0.0609}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0278}

epss

{'score': 0.04971}


Tue, 17 Dec 2024 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
CPEs cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
Vendors & Products Google
Google android

cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published:

Updated: 2024-08-02T01:52:56.288Z

Reserved: 2024-03-29T20:11:33.058Z

Link: CVE-2024-31317

cve-icon Vulnrichment

Updated: 2024-08-02T01:52:56.288Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-09T21:15:13.197

Modified: 2024-12-17T17:19:27.063

Link: CVE-2024-31317

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses