{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-43093","assignerOrgId":"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6","state":"PUBLISHED","assignerShortName":"google_android","dateReserved":"2024-08-05T14:29:53.937Z","datePublished":"2024-11-13T17:25:14.006Z","dateUpdated":"2025-10-21T22:55:36.710Z"},"containers":{"cna":{"providerMetadata":{"orgId":"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6","shortName":"google_android","dateUpdated":"2025-08-26T22:48:33.510Z"},"problemTypes":[{"descriptions":[{"lang":"en","description":"Elevation of privilege"}]}],"affected":[{"vendor":"Google","product":"Android","versions":[{"version":"15","status":"affected"},{"version":"14","status":"affected"},{"version":"13","status":"affected"},{"version":"12L","status":"affected"},{"version":"12","status":"affected"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"In shouldHideDocument of ExternalStorageProvider.java, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to  incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."}],"references":[{"url":"https://android.googlesource.com/platform/frameworks/base/+/7f83c671626f9bf993581f4598c22482d87cba10"},{"url":"https://source.android.com/security/bulletin/2025-03-01"}],"x_generator":{"engine":"cvelib 1.7.1"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.3,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2024-43093","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-11-13T17:51:45.945968Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2024-11-07","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-43093"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-43093","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-176","description":"CWE-176 Improper Handling of Unicode Encoding"}]}],"timeline":[{"time":"2024-11-07T00:00:00.000Z","lang":"en","value":"CVE-2024-43093 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T22:55:36.710Z"}}]}}