NVD Vulnerability Detail
Search Exploit, PoC
CVE-2024-20010
Summary

In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358560; Issue ID: ALPS08358560.

Publication Date Feb. 5, 2024, 3:15 p.m.
Registration Date Feb. 6, 2024, 10:01 a.m.
Last Update Nov. 21, 2024, 5:51 p.m.
CVSS3.1 : MEDIUM
スコア 6.7
Vector CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
攻撃元区分(AV) ローカル
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR)
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*
2 cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*
3 cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*
4 cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*
5 cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*
6 cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*
7 cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*
8 cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*
9 cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*
10 cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*
11 cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*
12 cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*
13 cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*
14 cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*
15 cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
16 cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
17 cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*
18 cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
19 cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
20 cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
21 cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
22 cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
23 cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*
24 cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
25 cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*
26 cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
27 cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
28 cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
29 cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
30 cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*
31 cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
32 cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
33 cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*
34 cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
35 cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*
36 cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
37 cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*
38 cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*
39 cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*
40 cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*
41 cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*
42 cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*
43 cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*
44 cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*
45 cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*
46 cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*
47 cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*
48 cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*
49 cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*
50 cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
51 cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
52 cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*
53 cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
54 cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*
55 cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*
56 cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*
57 cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List