In CompanionDeviceManagerService.java, there is a possible way to pair a companion device without user acceptance due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0001}

epss

{'score': 0.00034}


Tue, 17 Dec 2024 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
Weaknesses CWE-862
CPEs cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
Vendors & Products Google
Google android

cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published: 2024-07-09T20:09:16.004Z

Updated: 2024-08-02T01:52:56.195Z

Reserved: 2024-03-29T20:11:33.058Z

Link: CVE-2024-31318

cve-icon Vulnrichment

Updated: 2024-08-02T01:52:56.195Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-09T21:15:13.260

Modified: 2024-12-17T17:16:10.643

Link: CVE-2024-31318

cve-icon Redhat

No data.