First published: Mon Jul 01 2024(Updated: )
In com_android_internal_os_ZygoteCommandBuffer_nativeForkRepeatedly of com_android_internal_os_ZygoteCommandBuffer.cpp, there is a possible method to perform arbitrary code execution in any app zygote processes due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Google Android | =14.0 |
https://android.googlesource.com/platform/frameworks/base/+/293e9ac230851acbec73f5ab12928d113d6283e1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34720 has a high severity rating due to its potential for arbitrary code execution and local escalation of privilege.
To fix CVE-2024-34720, update to the latest versions of Android that have addressed the vulnerability, such as Android 12.1, 13.0, or 14.0.
CVE-2024-34720 affects Google Android versions 12.0, 12.1, 13.0, and 14.0.
CVE-2024-34720 can be exploited by malicious applications running on the affected Android versions to execute arbitrary code.
No, CVE-2024-34720 is not a remote exploitation risk as it requires local access to the affected device.