In gatts_process_read_by_type_req of gatt_sr.cc, there is a possible out of bounds write due to a logic error in the code. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://source.android.com/security/bulletin/2025-01-01 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
22 Apr 2025, 14:26
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://source.android.com/security/bulletin/2025-01-01 - Vendor Advisory | |
| CPE | cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* |
|
| First Time |
Google android
|
21 Jan 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-01-21 23:15
Updated : 2025-04-22 14:26
NVD link : CVE-2024-49747
Mitre link : CVE-2024-49747
JSON object : View
Products Affected
- android
CWE
No CWE.
