{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0015","assignerOrgId":"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6","state":"PUBLISHED","assignerShortName":"google_android","dateReserved":"2023-11-16T22:58:20.893Z","datePublished":"2024-02-16T18:33:36.716Z","dateUpdated":"2025-03-14T18:09:57.683Z"},"containers":{"cna":{"providerMetadata":{"orgId":"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6","shortName":"google_android","dateUpdated":"2024-02-16T19:36:22.896Z"},"problemTypes":[{"descriptions":[{"lang":"en","description":"Elevation of privilege"}]}],"affected":[{"vendor":"Google","product":"Android","versions":[{"version":"13","status":"affected"},{"version":"12L","status":"affected"},{"version":"12","status":"affected"},{"version":"11","status":"affected"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"In convertToComponentName of DreamService.java, there is a possible way to launch arbitrary protected activities due to intent redirection. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation."}],"references":[{"url":"https://android.googlesource.com/platform/frameworks/base/+/2ce1b7fd37273ea19fbbb6daeeaa6212357b9a70"},{"url":"https://source.android.com/security/bulletin/2024-01-01"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T17:41:14.617Z"},"title":"CVE Program Container","references":[{"url":"https://android.googlesource.com/platform/frameworks/base/+/2ce1b7fd37273ea19fbbb6daeeaa6212357b9a70","tags":["x_transferred"]},{"url":"https://source.android.com/security/bulletin/2024-01-01","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-280","lang":"en","description":"CWE-280 Improper Handling of Insufficient Permissions or Privileges"}]}],"affected":[{"vendor":"google","product":"android","cpes":["cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*","cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*","cpe:2.3:o:google:android:12l:*:*:*:*:*:*:*","cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"11.0","status":"affected"},{"version":"12.0","status":"affected"},{"version":"12l","status":"affected"},{"version":"13.0","status":"affected"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-02-20T15:20:08.693704Z","id":"CVE-2024-0015","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-14T18:09:57.683Z"}}]}}