← Zuruck zu CVEs
CVE-2024-43093
HIGHCISA KEV7.3
Beschreibung
In shouldHideDocument of ExternalStorageProvider.java, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CVE Details
CVSS v3.1 Bewertung7.3
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionREQUIRED
Veroffentlicht11/13/2024
Zuletzt geandert10/23/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerAndroid
ProduktFramework
SchwachstellennameAndroid Framework Privilege Escalation Vulnerability
KEV Aufnahmedatum2024-11-07
Behebungsfrist2024-11-28
Ransomware-NutzungUnknown
Betroffene Produkte
google:android
Schwachen (CWE)
CWE-176
Referenzen
https://android.googlesource.com/platform/frameworks/base/+/7f83c671626f9bf993581f4598c22482d87cba10(security@android.com)
https://source.android.com/security/bulletin/2025-03-01(security@android.com)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-43093(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.