⚠ Actively exploited
Added to CISA KEV on 2024-06-13. Federal agencies required to patch by 2024-07-04. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable..
CVE-2024-32896 — Always-Incorrect Control Flow Implementation in Build Soong
Severity
7.8HIGHNVD
EPSS
0.2%
top 60.48%
CISA KEV
KEV
Added 2024-06-13
Due 2024-07-04
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedJun 13
KEV addedJun 13
KEV dueJul 4
Latest updateSep 1
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Description
there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages5 packages
🔴Vulnerability Details
5GHSA
▶
CVEList
▶