In setSkipPrompt of AssociationRequest.java , there is a possible way to establish a companion device association without any confirmation due to CDM. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
| Link | Resource |
|---|---|
| https://android.googlesource.com/platform/frameworks/base/+/9722ce9d733edab76163fbcd21b231424e3d7061 | Mailing List Patch |
| https://android.googlesource.com/platform/frameworks/base/+/df49e0e3083b0707e2cca5a5956b49f14ded078e | Mailing List Patch |
| https://source.android.com/security/bulletin/2024-07-01 | Patch Vendor Advisory |
| https://android.googlesource.com/platform/frameworks/base/+/9722ce9d733edab76163fbcd21b231424e3d7061 | Mailing List Patch |
| https://android.googlesource.com/platform/frameworks/base/+/df49e0e3083b0707e2cca5a5956b49f14ded078e | Mailing List Patch |
| https://source.android.com/security/bulletin/2024-07-01 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-07-09 21:15
Updated : 2024-12-17 19:07
NVD link : CVE-2024-31320
Mitre link : CVE-2024-31320
CVE.ORG link : CVE-2024-31320
JSON object : View
Products Affected
- android
CWE
