2024-07-09 22:03:12 +00:00
{
"id" : "CVE-2024-31320" ,
"sourceIdentifier" : "security@android.com" ,
"published" : "2024-07-09T21:15:13.373" ,
2024-12-17 21:03:47 +00:00
"lastModified" : "2024-12-17T19:07:28.027" ,
"vulnStatus" : "Analyzed" ,
2024-07-09 22:03:12 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "In setSkipPrompt of AssociationRequest.java , there is a possible way to establish a companion device association without any confirmation due to CDM. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
2024-07-11 14:03:13 +00:00
} ,
{
"lang" : "es" ,
"value" : "En setSkipPrompt de AssociationRequest.java, existe una forma posible de establecer una asociaci\u00f3n de dispositivo complementario sin ninguna confirmaci\u00f3n debido a CDM. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
2024-07-09 22:03:12 +00:00
}
] ,
2024-07-12 18:03:13 +00:00
"metrics" : {
"cvssMetricV31" : [
2024-12-17 21:03:47 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
} ,
2024-07-12 18:03:13 +00:00
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.4 ,
"baseSeverity" : "HIGH" ,
2024-07-12 18:03:13 +00:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-07-12 18:03:13 +00:00
} ,
"exploitabilityScore" : 1.4 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
2024-12-17 21:03:47 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
} ,
2024-07-12 18:03:13 +00:00
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-269"
} ,
{
"lang" : "en" ,
"value" : "CWE-284"
}
]
}
] ,
2024-12-17 21:03:47 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72"
}
]
}
]
}
] ,
2024-07-09 22:03:12 +00:00
"references" : [
{
"url" : "https://android.googlesource.com/platform/frameworks/base/+/9722ce9d733edab76163fbcd21b231424e3d7061" ,
2024-12-17 21:03:47 +00:00
"source" : "security@android.com" ,
"tags" : [
"Mailing List" ,
"Patch"
]
2024-07-09 22:03:12 +00:00
} ,
{
"url" : "https://android.googlesource.com/platform/frameworks/base/+/df49e0e3083b0707e2cca5a5956b49f14ded078e" ,
2024-12-17 21:03:47 +00:00
"source" : "security@android.com" ,
"tags" : [
"Mailing List" ,
"Patch"
]
2024-07-09 22:03:12 +00:00
} ,
{
"url" : "https://source.android.com/security/bulletin/2024-07-01" ,
2024-12-17 21:03:47 +00:00
"source" : "security@android.com" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://android.googlesource.com/platform/frameworks/base/+/9722ce9d733edab76163fbcd21b231424e3d7061" ,
2024-12-17 21:03:47 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Patch"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://android.googlesource.com/platform/frameworks/base/+/df49e0e3083b0707e2cca5a5956b49f14ded078e" ,
2024-12-17 21:03:47 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Patch"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://source.android.com/security/bulletin/2024-07-01" ,
2024-12-17 21:03:47 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-07-09 22:03:12 +00:00
}
]
}