First published: Tue Sep 03 2024(Updated: )
In onCreate of SettingsHomepageActivity.java, there is a possible way to access the Settings app while the device is provisioning due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 | |
Android | =14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40652 is classified as a moderate severity vulnerability due to its potential for local privilege escalation.
To resolve CVE-2024-40652, ensure that your device is updated with the latest security patch provided by Google for Android versions affected.
CVE-2024-40652 affects Android versions 12.0, 12.1, 13.0, and 14.0.
Yes, user interaction is necessary for the successful exploitation of CVE-2024-40652.
CVE-2024-40652 could allow an attacker to gain access to the Settings app during the device provisioning process, leading to potential local privilege escalation.