In CompanionDeviceManagerService.java, there is a possible way to pair a companion device without user acceptance due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Dec 2024 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Google
Google android |
|
Weaknesses | CWE-862 | |
CPEs | cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Google
Google android |
MITRE
Status: PUBLISHED
Assigner: google_android
Published: 2024-07-09T20:09:16.004Z
Updated: 2024-08-02T01:52:56.195Z
Reserved: 2024-03-29T20:11:33.058Z
Link: CVE-2024-31318
Vulnrichment
Updated: 2024-08-02T01:52:56.195Z
NVD
Status : Analyzed
Published: 2024-07-09T21:15:13.260
Modified: 2024-12-17T17:16:10.643
Link: CVE-2024-31318
Redhat
No data.