CVE-2017-13286 — Deserialization of Untrusted Data in INC Android
Severity
7.8HIGHNVD
EPSS
0.0%
top 98.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 4
Latest updateMay 13
Description
In writeToParcel and readFromParcel of OutputConfiguration.java, there is a permission bypass due to mismatched serialization. This could lead to a local escalation of privilege where the user can start an activity with system privileges, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-69683251.
CVSS vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
2📋Vendor Advisories
1Android▶
CVE-2017-13286: Android Security Bulletin 2018-04-01
CVE: CVE-2017-13286
Severity: HIGH
Type: EoP
Affected AOSP versions: 8↗2018-04-01