there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
Metrics
Affected Vendors & Products
References
History
Fri, 29 Nov 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs |
Wed, 14 Aug 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | CWE-755 |
MITRE
Status: PUBLISHED
Assigner: Google_Devices
Published: 2024-04-05T20:02:16.425Z
Updated: 2024-08-02T01:10:55.524Z
Reserved: 2024-03-19T15:05:26.954Z
Link: CVE-2024-29748
Vulnrichment
Updated: 2024-05-01T16:36:33.576Z
NVD
Status : Analyzed
Published: 2024-04-05T20:15:08.407
Modified: 2024-11-29T16:39:20.167
Link: CVE-2024-29748
Redhat
No data.