First published: Mon Jul 01 2024(Updated: )
In setSkipPrompt of AssociationRequest.java , there is a possible way to establish a companion device association without any confirmation due to CDM. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =12.0 | |
Google Android | =12.1 |
https://android.googlesource.com/platform/frameworks/base/+/9722ce9d733edab76163fbcd21b231424e3d7061
https://android.googlesource.com/platform/frameworks/base/+/df49e0e3083b0707e2cca5a5956b49f14ded078e
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31320 has a critical severity level due to its potential for local escalation of privileges.
CVE-2024-31320 allows the establishment of a companion device association without user confirmation on affected Android versions.
CVE-2024-31320 affects Google Android versions 12.0 and 12.1.
To address CVE-2024-31320, ensure that your Android device is updated to the latest security patches provided by Google.
No, exploitation of CVE-2024-31320 does not require any user interaction.