Impact
The vulnerability resides in several functions within ffa.c of the Android kernel. A logic flaw can corrupt memory and allows an attacker who can run code on the device to elevate privileges locally. No additional execution privileges are required and no user interaction is needed, so any user‑space process with sufficient rights could trigger the corruption.
Affected Systems
Affected systems are Android devices that run the default kernel image provided by Google. The flaw exists in the ffa.c component, and no specific firmware or Android version is listed, meaning all devices that include this source code are potentially vulnerable.
Risk and Exploitability
The CVSS score of 8.4 indicates a high severity vulnerability. The EPSS score of <1% reflects a currently low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local: an attacker who can execute code on the device can exploit the memory corruption to gain elevated privileges without needing any special user interaction or external access.
OpenCVE Enrichment