CVE-2024-0014Protection Mechanism Failure in Vendor Google Services Configupdater

Severity
7.8HIGHNVD
EPSS
0.1%
top 78.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 16

Description

In startInstall of UpdateFetcher.java, there is a possible way to trigger a malicious config update due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

Androidplatform/vendor_google_services_configupdater11:011:2024-02-01+4
CVEListV5google/android5 versions+4
NVDgoogle/android5 versions+4

🔴Vulnerability Details

2
GHSA
GHSA-4mwq-x2m3-qxc6: In startInstall of UpdateFetcher2024-02-16
OSV
CVE-2024-0014: In startInstall of UpdateFetcher2024-02-01

📋Vendor Advisories

1
Android
CVE-2024-0014: Android Security Bulletin 2024-02-01 CVE: CVE-2024-0014 Severity: HIGH Type: EoP Affected AOSP versions: 11, 12, 12L, 13, 14 References: A-3040824742024-02-01