In many locations, there is a possible way to access kernel memory in user space due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
Link | Resource |
---|---|
https://source.android.com/security/bulletin/pixel/2018-06-01 | Vendor Advisory |
Configurations
History
10 Jul 2025, 20:42
Type | Values Removed | Values Added |
---|---|---|
First Time |
Google
Google android |
|
References | () https://source.android.com/security/bulletin/pixel/2018-06-01 - Vendor Advisory | |
CPE | cpe:2.3:o:google:android:-:*:*:*:*:*:*:* |
24 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-276 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
18 Feb 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE |
21 Jan 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
18 Jan 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-18 00:15
Updated : 2025-07-10 20:42
NVD link : CVE-2018-9401
Mitre link : CVE-2018-9401
CVE.ORG link : CVE-2018-9401
JSON object : View
Products Affected
- android
CWE
CWE-276
Incorrect Default Permissions