There is a possible escalation of privilege due to improperly used crypto. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
Link | Resource |
---|---|
https://source.android.com/security/bulletin/pixel/2024-06-01 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-06-13 21:15
Updated : 2024-07-16 14:57
NVD link : CVE-2024-32911
Mitre link : CVE-2024-32911
CVE.ORG link : CVE-2024-32911
JSON object : View
Products Affected
- android
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm