There is a possible escalation of privilege due to improperly used crypto. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
| Link | Resource |
|---|---|
| https://source.android.com/security/bulletin/pixel/2024-06-01 | Vendor Advisory |
Configurations
History
16 Jul 2024, 14:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://source.android.com/security/bulletin/pixel/2024-06-01 - Vendor Advisory | |
| CPE | cpe:2.3:o:google:android:-:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CWE | CWE-327 | |
| First Time |
Google android
|
13 Jun 2024, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-06-13 21:15
Updated : 2024-09-06 23:35
NVD link : CVE-2024-32911
Mitre link : CVE-2024-32911
JSON object : View
Products Affected
- android
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
