First published: Mon Jan 06 2025(Updated: )
In gatts_process_read_req of gatt_sr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43771 has a high severity level due to its potential to allow remote code execution.
To fix CVE-2024-43771, users should update their affected Android systems to the latest security patch released by Google.
The potential impact of CVE-2024-43771 includes unauthorized remote code execution on vulnerable Android devices.
CVE-2024-43771 primarily affects users of Google Android operating systems.
No, user interaction is not required for the exploitation of CVE-2024-43771.