CVE-2017-13286Deserialization of Untrusted Data in INC Android

Severity
7.8HIGHNVD
EPSS
0.0%
top 98.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 4
Latest updateMay 13

Description

In writeToParcel and readFromParcel of OutputConfiguration.java, there is a permission bypass due to mismatched serialization. This could lead to a local escalation of privilege where the user can start an activity with system privileges, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-69683251.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

NVDgoogle/android8.0, 8.1+1
CVEListV5google_inc/android8.0, 8.1+1

🔴Vulnerability Details

2
GHSA
GHSA-rf9m-pw9r-xjj5: In writeToParcel and readFromParcel of OutputConfiguration2022-05-13
CVEList
CVE-2017-13286: In writeToParcel and readFromParcel of OutputConfiguration2018-04-04

📋Vendor Advisories

1
Android
CVE-2017-13286: Android Security Bulletin 2018-04-01 CVE: CVE-2017-13286 Severity: HIGH Type: EoP Affected AOSP versions: 82018-04-01
CVE-2017-13286 — Deserialization of Untrusted Data | cvebase