Impact
In the Android kernel source file mem_protect.c, a logic error permits an attacker to execute arbitrary code at the kernel level, enabling local privilege escalation. The flaw can be triggered without any user interaction and does not require additional execution privileges, allowing a standard user to gain kernel privileges. The vulnerability is a classic example of improper privilege management within kernel code, leading to potential compromise of system integrity and confidentiality.
Affected Systems
Android operating systems that include the affected kernel version, specifically devices running the Google Android kernel before the immediately released patch. Exact firmware versions are not disclosed in the advisory, so all devices running kernel builds that incorporate the faulty mem_protect.c functions are considered vulnerable.
Risk and Exploitability
The CVSS v3.1 score of 8.4 reflects high severity, and although the EPSS score is currently under 1%, which indicates a low probability of exploitation in the immediate future, the vulnerability remains critical due to the lack of user interaction and the ability to elevate privileges to kernel level. The vulnerability is not listed in the CISA KEV catalog at this time, but adversaries with local access to a device could exploit the flaw with minimal effort, especially if no mitigating controls are in place.
OpenCVE Enrichment