In multiple locations, there is a possible way to launch activities from the background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Attack Parameters
Impact Assessment
CVSS Vector v3.1
Weakness Type (CWE)
Vulnerable Products 4
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
Google Android
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
|
— | — |
|
Google Android
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
|
— | — |
|
Google Android
cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
|
— | — |
|
Google Android
cpe:2.3:o:google:android:16.0:*:*:*:*:*:*:*
|
— | — |