First published: Mon Jan 06 2025(Updated: )
In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to bypass parcel mismatch mitigation due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =12.0 | |
Android | =12.1 | |
Android | =13.0 | |
Android | =14.0 | |
Android | =15.0 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49744 is classified as a high severity vulnerability due to its potential for local escalation of privilege.
To fix CVE-2024-49744, update your Android software to the latest version that includes the security patch.
CVE-2024-49744 exploits unsafe deserialization, which can lead to privilege escalation.
Yes, user interaction is necessary for the exploitation of CVE-2024-49744.
CVE-2024-49744 affects specific versions of Android prior to the security patch related to this vulnerability.