First published: Tue Sep 03 2024(Updated: )
In scheme of Uri.java, there is a possible way to craft a malformed Uri object due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 | |
Android | =14.0 | |
https://android.googlesource.com/platform/frameworks/base/+/e7af00cafb52a25933ec4edb80c5111d42af0237
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40662 has a severity rating that indicates a high potential for local privilege escalation.
To fix CVE-2024-40662, update your Android device to the latest version provided in the security patches.
CVE-2024-40662 affects Android versions 12.0, 12.1, 13.0, and 14.0.
No, user interaction is not needed for exploitation of CVE-2024-40662.
CVE-2024-40662 is a vulnerability caused by improper input validation in the Uri.java scheme.