First published: Mon Nov 04 2024(Updated: )
In handleMessage of UsbDeviceManager.java, there is a possible method to access device contents over USB without unlocking the device due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Google Android | =14.0 | |
Google Android | =15.0 |
https://android.googlesource.com/platform/frameworks/base/+/2457d4e459ee6ffd099b9ff7cce9c83119c3ce66
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43085 has a severity rating that indicates a local escalation of privilege without requiring additional execution privileges.
To fix CVE-2024-43085, users should update their Android devices to the latest security patch provided by Google.
CVE-2024-43085 affects Android versions 12.0, 12.1, 13.0, 14.0, and 15.0.
CVE-2024-43085 is a logic error vulnerability that allows access to device contents over USB without device unlocking.
No, CVE-2024-43085 does not require user interaction to exploit the vulnerability.