- Description
- In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
- Source
- security@android.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 6.7
- Impact score
- 5.9
- Exploitability score
- 0.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- MEDIUM
- Hype score
- Not currently trending
New Google VRP writeup "Reviving an already patched vulnerability for half a year? The second spring of CVE-2024-0044" for a bounty of $8,000 by canyie: https://t.co/bajf09zeMM
@gvrp_writeups
24 Feb 2025
197 Impressions
0 Retweets
2 Likes
4 Bookmarks
0 Replies
0 Quotes
New Google VRP writeup "Reviving an already patched vulnerability for half a year? The second spring of CVE-2024-0044" for a bounty of $8,000 by canyie: https://t.co/bajf09zMCk
@gvrp_writeups
24 Feb 2025
243 Impressions
0 Retweets
2 Likes
3 Bookmarks
0 Replies
0 Quotes
CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13https://github.com/pl4int3xt/cve_2024_0044
@SNOWDEN69200694
27 Oct 2024
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
},
{
"criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72"
},
{
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
},
{
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
}
],
"operator": "OR"
}
]
}
]