Vulnerability Description
In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | 12.0 |
Related Weaknesses (CWE)
References
- https://android.googlesource.com/platform/frameworks/base/+/836750619a8bce0bf78f
- https://android.googlesource.com/platform/frameworks/base/+/954b2874b85b6cd0d6bb
- https://source.android.com/security/bulletin/2024-10-01
- https://android.googlesource.com/platform/frameworks/base/+/65bd134b0a82c51a143bMailing ListPatch
- https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fThird Party Advisory
- https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.htmlExploitThird Party Advisory
- https://source.android.com/security/bulletin/2024-03-01Not Applicable
FAQ
What is CVE-2024-0044?
CVE-2024-0044 is a vulnerability with a CVSS score of 6.7 (MEDIUM). In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execu...
How severe is CVE-2024-0044?
CVE-2024-0044 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-0044?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.