First published: Wed Oct 09 2024(Updated: )
In linkturbonative service, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed.
Credit: security@unisoc.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Android | =13.0 | |
Android | =14.0 | |
Any of | ||
Unisoc S8000 Firmware | ||
Unisoc SC7731 | ||
Unisoc SC9832E Firmware | ||
Unisoc SC9863A Firmware | ||
Unisoc T310 | ||
Unisoc T606 | ||
Unisoc T610 | ||
Unisoc T612 | ||
Unisoc T616 | ||
UniSoc T618 | ||
Unisoc T760 Firmware | ||
Unisoc T770 | ||
Unisoc T820 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39438 has a high severity due to its potential for local escalation of privilege.
To fix CVE-2024-39438, ensure proper input validation on the linkturbonative service.
Exploiting CVE-2024-39438 could allow an attacker to execute commands with system execution privileges.
Google Android versions 13.0 and 14.0 are affected by CVE-2024-39438.
CVE-2024-39438 is related to the linkturbonative service on software and not identified as a specific hardware vulnerability.