First published: Mon Feb 05 2024(Updated: )
In startInstall of UpdateFetcher.java, there is a possible way to trigger a malicious config update due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | =11.0 | |
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 | |
Android | =14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0014 is classified as a high severity vulnerability due to its potential for local escalation of privilege.
To fix CVE-2024-0014, users should update their Android devices to the latest security patch released by Google.
CVE-2024-0014 affects users of Google Android versions 11.0 through 14.0.
No, user interaction is not needed for the exploitation of CVE-2024-0014.
CVE-2024-0014 can lead to local escalation of privilege, compromising device security without additional execution privileges.