First published: Mon Nov 04 2024(Updated: )
In installExistingPackageAsUser of InstallPackageHelper.java, there is a possible carrier restriction bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Google Android | =14.0 | |
Google Android | =15.0 |
https://android.googlesource.com/platform/frameworks/base/+/31c098c4271ad4fdfb3809e05017ead8d9f6580f
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43081 is considered a critical vulnerability due to its potential for local escalation of privilege.
To mitigate CVE-2024-43081, users should update their Android devices to the latest security patches.
CVE-2024-43081 affects Google Android versions 12.0, 12.1, 13.0, 14.0, and 15.0.
No, user interaction is not needed for the exploitation of CVE-2024-43081.
CVE-2024-43081 is a logic error vulnerability that allows a carrier restriction bypass.