In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITE_SECURE_SETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published: 2024-07-09T20:09:15.933Z

Updated: 2024-08-02T01:52:56.288Z

Reserved: 2024-03-29T20:11:33.058Z

Link: CVE-2024-31317

cve-icon Vulnrichment

Updated: 2024-08-02T01:52:56.288Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-09T21:15:13.197

Modified: 2024-07-11T15:05:39.587

Link: CVE-2024-31317

cve-icon Redhat

No data.