In wifi_item_edit_content of styles.xml , there is a possible FRP bypass due to Missing check for FRP state. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
Link | Resource |
---|---|
https://android.googlesource.com/platform/packages/apps/Settings/+/2968ccc911956fa5813a9a6a5e5c8970e383a60f | Mailing List Patch |
https://source.android.com/security/bulletin/2024-09-01 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
17 Dec 2024, 19:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://android.googlesource.com/platform/packages/apps/Settings/+/2968ccc911956fa5813a9a6a5e5c8970e383a60f - Mailing List, Patch | |
References | () https://source.android.com/security/bulletin/2024-09-01 - Patch, Vendor Advisory | |
First Time |
Google android
|
|
CPE | cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* |
|
CWE | CWE-862 |
Information
Published : 2024-09-11 00:15
Updated : 2024-12-17 19:08
NVD link : CVE-2024-40650
Mitre link : CVE-2024-40650
CVE.ORG link : CVE-2024-40650
JSON object : View
Products Affected
- android