Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-29748


there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.


Published

2024-04-05T20:15:08.407

Last Modified

2024-11-29T16:39:20.167

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

Weaknesses
  • Type: Primary
    CWE-755
  • Type: Secondary
    CWE-280

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System google android < 2024-04-05 Yes
Hardware google pixel - No

References