First published: Wed Jan 03 2024(Updated: )
In multiple locations, there is a possible out of bounds read due to a missing bounds check. This could lead to paired device information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Google Android | =14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0016 is classified as a moderate vulnerability due to its potential for information disclosure.
To mitigate CVE-2024-0016, ensure you are using the latest version of Google Android that addresses this vulnerability.
CVE-2024-0016 affects Google Android versions 11.0, 12.0, 12.1, 13.0, and 14.0.
CVE-2024-0016 does not require user interaction for exploitation, making it potentially exploitable remotely.
CVE-2024-0016 could lead to the disclosure of paired device information.