First published: Mon Feb 05 2024(Updated: )
In attp_build_read_by_type_value_cmd of att_protocol.cc , there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | =11.0 | |
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 | |
Android | =14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-0031 is considered a critical vulnerability that could lead to remote code execution.
To mitigate CVE-2024-0031, users should update their Android devices to the latest security patches provided by Google.
CVE-2024-0031 affects Android versions 11.0, 12.0, 12.1, 13.0, and 14.0.
No, user interaction is not required for exploiting CVE-2024-0031.
CVE-2024-0031 is classified as a possible out of bounds write vulnerability due to improper input validation.