First published: Tue Sep 04 2018(Updated: )
In writeToParcel of MediaPlayer.java, there is a possible serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | =7.0 | |
Android | =7.1.1 | |
Android | =7.1.2 | |
Android | =8.0 | |
Android | =8.1 | |
Android | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-9474 has been classified with a high severity rating due to the potential for local escalation of privilege.
To fix CVE-2018-9474, update affected Android devices to the latest security patch version that addresses this vulnerability.
CVE-2018-9474 affects Android versions 7.0, 7.1.1, 7.1.2, 8.0, 8.1, and 9.0.
Exploitation of CVE-2018-9474 does not require any user interaction, making it particularly concerning.
The potential consequence of CVE-2018-9474 is local escalation of privilege, allowing unauthorized access to system resources.