⚠ Actively exploited
Added to CISA KEV on 2024-04-04. Federal agencies required to patch by 2024-04-25. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable..

CVE-2024-29748Improper Handling of Exceptional Conditions in Google Android

Severity
7.8HIGHNVD
EPSS
0.4%
top 38.45%
CISA KEV
KEV
Added 2024-04-04
Due 2024-04-25
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
KEV addedApr 4
PublishedApr 5
KEV dueApr 25
Latest updateAug 5
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Description

there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

NVDgoogle/android< 2024-04-05
CVEListV5google/androidAndroid kernel

🔴Vulnerability Details

3
GHSA
GHSA-w9xx-xhpg-c678: there is a possible way to bypass due to a logic error in the code2024-04-05
OSV
CVE-2024-29748: there is a possible way to bypass due to a logic error in the code2024-04-01
VulnCheck
Android Pixel Privilege Escalation Vulnerability2024

📋Vendor Advisories

1
CISA
Android Pixel Privilege Escalation Vulnerability2024-04-04

🕵️Threat Intelligence

1
Bleepingcomputer
Google fixes Android kernel zero-day exploited in targeted attacks2024-08-05