CVE-2024-40677
https://notcve.org/view.php?id=CVE-2024-40677
28 Jan 2025 — In shouldSkipForInitialSUW of AdvancedPowerUsageDetail.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. • https://android.googlesource.com/platform/packages/apps/Settings/+/db26138f07db830e3fb78283d37de3c0296d93cb • CWE-862: Missing Authorization •
CVE-2024-40676
https://notcve.org/view.php?id=CVE-2024-40676
28 Jan 2025 — In checkKeyIntent of AccountManagerService.java, there is a possible way to bypass intent security check and install an unknown app due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. • https://github.com/Aakashmom/frameworks_base_accounts_CVE-2024-40676 •
CVE-2024-40675
https://notcve.org/view.php?id=CVE-2024-40675
28 Jan 2025 — In parseUriInternal of Intent.java, there is a possible infinite loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. • https://github.com/Aakashmom/intent_CVE-2024-40675 •
CVE-2024-40673
https://notcve.org/view.php?id=CVE-2024-40673
28 Jan 2025 — In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. • https://github.com/Aakashmom/G3_libcore_native_CVE-2024-40673 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2024-40672
https://notcve.org/view.php?id=CVE-2024-40672
28 Jan 2025 — In onCreate of ChooserActivity.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. • https://android.googlesource.com/platform/packages/modules/IntentResolver/+/ccd29124d0d2276a3071c0418c14dec188cd3727 • CWE-281: Improper Preservation of Permissions •
CVE-2024-49749
https://notcve.org/view.php?id=CVE-2024-49749
21 Jan 2025 — In DGifSlurp of dgif_lib.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/2025-01-01 • CWE-787: Out-of-bounds Write •
CVE-2024-49748
https://notcve.org/view.php?id=CVE-2024-49748
21 Jan 2025 — In gatts_process_primary_service_req of gatt_sr.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/2025-01-01 • CWE-787: Out-of-bounds Write •
CVE-2024-49747
https://notcve.org/view.php?id=CVE-2024-49747
21 Jan 2025 — In gatts_process_read_by_type_req of gatt_sr.cc, there is a possible out of bounds write due to a logic error in the code. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/2025-01-01 • CWE-787: Out-of-bounds Write •
CVE-2024-49745
https://notcve.org/view.php?id=CVE-2024-49745
21 Jan 2025 — In growData of Parcel.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/2025-01-01 • CWE-787: Out-of-bounds Write •
CVE-2024-49744
https://notcve.org/view.php?id=CVE-2024-49744
21 Jan 2025 — In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to bypass parcel mismatch mitigation due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. • https://source.android.com/security/bulletin/2025-01-01 • CWE-502: Deserialization of Untrusted Data •