{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2018-9471","assignerOrgId":"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6","state":"PUBLISHED","assignerShortName":"google_android","dateReserved":"2018-04-05T00:00:00.000Z","datePublished":"2024-11-20T17:16:53.353Z","dateUpdated":"2024-11-20T18:38:12.566Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Android","vendor":"Google","versions":[{"status":"affected","version":"7"},{"status":"affected","version":"8"},{"status":"affected","version":"8.1"},{"status":"affected","version":"9"},{"status":"affected","version":"nyc-mr1-dev"},{"status":"affected","version":"nyc-mr2-dev"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">In the deserialization constructor of NanoAppFilter.java, there is a possible loss of data due to type confusion. This could lead to local escalation of privilege in the system server with no additional execution privileges needed. User interaction is not needed for exploitation.</span><br>"}],"value":"In the deserialization constructor of NanoAppFilter.java, there is a possible loss of data due to type confusion. This could lead to local escalation of privilege in the system server with no additional execution privileges needed. User interaction is not needed for exploitation."}],"providerMetadata":{"orgId":"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6","shortName":"google_android","dateUpdated":"2024-11-20T17:16:53.353Z"},"references":[{"url":"https://source.android.com/security/bulletin/2018-09-01"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-787","lang":"en","description":"CWE-787 Out-of-bounds Write"}]}],"affected":[{"vendor":"google","product":"android","cpes":["cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*","cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*","cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*","cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"7.0","status":"affected"},{"version":"8.0","status":"affected"},{"version":"8.1","status":"affected"},{"version":"9.0","status":"affected"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-11-20T18:36:34.923448Z","id":"CVE-2018-9471","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-20T18:38:12.566Z"}}]}}