### [CVE-2024-32896](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32896) ![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=Android%20kernel%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brightgreen) ### Description there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ChalkingCode/ExploitedDucks