CVE-2024-43093
Android Framework Privilege Escalation Vulnerability
Severity Score
7.8
*CVSS v3.1
Exploit Likelihood
< 1%
*EPSS
Affected Versions
4
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
Yes
*KEV
Decision
Act
*SSVC
Descriptions
In shouldHideDocument of ExternalStorageProvider.java, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
Android Framework contains an unspecified vulnerability that allows for privilege escalation.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Act
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-08-05 CVE Reserved
- 2024-11-07 Exploited in Wild
- 2024-11-13 CVE Published
- 2024-11-14 CVE Updated
- 2024-11-15 First Exploit
- 2024-11-28 KEV Due Date
- 2025-03-30 EPSS Updated
CWE
CAPEC
References (3)
URL | Date | SRC |
---|
URL | Date | SRC |
---|