First published: Tue Sep 03 2024(Updated: )
In wifi_item_edit_content of styles.xml , there is a possible FRP bypass due to Missing check for FRP state. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 | |
Android | =14.0 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40650 has a medium severity rating due to its potential for local privilege escalation.
To mitigate CVE-2024-40650, ensure that your Android device is updated to the latest security patch provided by Google.
CVE-2024-40650 affects Android versions 12.0, 12.1, 13.0, and 14.0.
No, user interaction is not required to exploit CVE-2024-40650.
Exploitation of CVE-2024-40650 could lead to a local escalation of privileges, potentially allowing unauthorized access to sensitive functions.