First published: Mon Jun 03 2024(Updated: )
In updateNotificationChannelFromPrivilegedListener of NotificationManagerService.java, there is a possible cross-user data leak due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 | |
Android | =14.0 |
https://android.googlesource.com/platform/frameworks/base/+/3cc021bf608fa813a9a40932028fdde2b12a2d5e
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31319 has a medium severity rating due to its potential for local escalation of privileges.
Fixing CVE-2024-31319 involves updating the affected Android versions to the latest security patches provided by Google.
CVE-2024-31319 affects Android versions 12.0, 12.1, 13.0, and 14.0.
Yes, CVE-2024-31319 can be exploited without user interaction, making it a serious concern.
CVE-2024-31319 involves a cross-user data leak due to a confused deputy in the NotificationManagerService.