First published: Mon May 07 2018(Updated: )
In the read() function of ProcessStats.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =7.0 | |
Google Android | =7.1.1 | |
Google Android | =7.1.2 | |
Google Android | =8.0 | |
Google Android | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13311 is considered a high severity vulnerability due to its potential for local privilege escalation.
To fix CVE-2017-13311, update your Android device to the latest version that addresses this security issue.
CVE-2017-13311 affects Android versions 7.0, 7.1.1, 7.1.2, 8.0, and 8.1.
CVE-2017-13311 is a permissions bypass vulnerability that can lead to local escalation of privilege.
No, user interaction is not required to exploit CVE-2017-13311.