First published: Wed Oct 09 2024(Updated: )
In linkturbonative service, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed.
Credit: security@unisoc.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Google Android | =13.0 | |
Google Android | =14.0 | |
Any of | ||
Unisoc S8000 | ||
Unisoc SC7731E | ||
Unisoc SC9832E | ||
Unisoc SC9863A | ||
Unisoc T310 | ||
Unisoc T606 | ||
Unisoc T610 | ||
Unisoc T612 | ||
Unisoc T616 | ||
UniSoc T618 | ||
Unisoc T760 | ||
Unisoc T770 | ||
Unisoc T820 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39437 is rated as a high-severity vulnerability due to its potential for command injection and local privilege escalation.
To fix CVE-2024-39437, ensure proper input validation and sanitization in the linkturbonative service.
CVE-2024-39437 affects Google Android versions 13.0 and 14.0.
The impact of CVE-2024-39437 can include local escalation of privileges, allowing attackers to execute commands with system-level permissions.
Yes, Unisoc has acknowledged CVE-2024-39437 and published an announcement regarding the vulnerability.