Vulnerability Description
In setSkipPrompt of AssociationRequest.java , there is a possible way to establish a companion device association without any confirmation due to CDM. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | 12.0 |
Related Weaknesses (CWE)
References
- https://android.googlesource.com/platform/frameworks/base/+/9722ce9d733edab76163Mailing ListPatch
- https://android.googlesource.com/platform/frameworks/base/+/df49e0e3083b0707e2ccMailing ListPatch
- https://source.android.com/security/bulletin/2024-07-01PatchVendor Advisory
- https://android.googlesource.com/platform/frameworks/base/+/9722ce9d733edab76163Mailing ListPatch
- https://android.googlesource.com/platform/frameworks/base/+/df49e0e3083b0707e2ccMailing ListPatch
- https://source.android.com/security/bulletin/2024-07-01PatchVendor Advisory
FAQ
What is CVE-2024-31320?
CVE-2024-31320 is a vulnerability with a CVSS score of 7.8 (HIGH). In setSkipPrompt of AssociationRequest.java , there is a possible way to establish a companion device association without any confirmation due to CDM. This could lead to local escalation of privilege ...
How severe is CVE-2024-31320?
CVE-2024-31320 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-31320?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.