there is a possible Authentication Bypass due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
References
History
Thu, 03 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Google
Google android |
|
CPEs | cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* | |
Vendors & Products |
Google
Google android |
Tue, 27 Aug 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 | |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Google_Devices
Published: 2024-03-11T18:55:34.794Z
Updated: 2024-08-27T14:50:49.938Z
Reserved: 2024-01-03T21:00:57.455Z
Link: CVE-2024-22005

Updated: 2024-08-01T22:35:34.619Z

Status : Analyzed
Published: 2024-03-11T19:15:47.120
Modified: 2025-04-03T15:50:01.757
Link: CVE-2024-22005

No data.