First published: Mon Jan 06 2025(Updated: )
In multiple functions of AccountManagerService.java, there is a possible way to bypass permissions and launch protected activities due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 | |
Android | =14.0 | |
Android | =15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49724 is classified with a high severity due to its potential for local privilege escalation.
To mitigate CVE-2024-49724, update your Android device to the latest security patch provided by Google.
CVE-2024-49724 affects users of Google Android operating systems that contain the vulnerable versions of AccountManagerService.java.
Yes, user interaction is required to exploit CVE-2024-49724, making it dependent on the user's actions.
Exploitation of CVE-2024-49724 could allow an attacker to bypass permissions and initiate protected activities, leading to unauthorized access.