In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to bypass parcel mismatch mitigation due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://source.android.com/security/bulletin/2025-01-01 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
22 Apr 2025, 14:40
Type | Values Removed | Values Added |
---|---|---|
First Time |
Google android
|
|
CPE | cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* |
|
References | () https://source.android.com/security/bulletin/2025-01-01 - Vendor Advisory |
21 Jan 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-21 23:15
Updated : 2025-04-22 14:40
NVD link : CVE-2024-49744
Mitre link : CVE-2024-49744
JSON object : View
Products Affected
- android
CWE
No CWE.