First published: Wed Aug 12 2020(Updated: )
A local, arbitrary code execution vulnerability exists in the SplitCompat.install endpoint in Android's Play Core Library versions prior to 1.7.2. A malicious attacker could create an apk which targets a specific application, and if a victim were to install this apk, the attacker could perform a directory traversal, execute code as the targeted application and access the targeted application's data on the Android device. We recommend all users update Play Core to version 1.7.2 or later.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android Play Core Library | <1.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8913 is a local arbitrary code execution vulnerability in the SplitCompat.install endpoint in Android's Play Core Library versions prior to 1.7.2.
The severity of CVE-2020-8913 is high, with a CVSS score of 8.8.
CVE-2020-8913 allows a malicious attacker to create an apk that targets a specific application on Android, and when the victim installs this apk, the attacker can execute arbitrary code on the victim's device.
To fix CVE-2020-8913, Android users should update the Play Core Library on their devices to version 1.7.2 or higher.
Yes, you can find more information about CVE-2020-8913 in the following references: [Reference 1](https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/) and [Reference 2](https://developer.android.com/reference/com/google/android/play/core/release-notes#1-7-2).