Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43093: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2024-43093cvecve-2024-43093
Published: Wed Nov 13 2024 (11/13/2024, 17:25:14 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In shouldHideDocument of ExternalStorageProvider.java, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:25:53 UTC

Technical Analysis

CVE-2024-43093 is a vulnerability in the Android operating system affecting versions 12, 12L, 13, 14, and 15. The flaw exists in the ExternalStorageProvider.java component, specifically within the shouldHideDocument method, which is responsible for filtering file paths to prevent access to sensitive directories. Due to incorrect Unicode normalization, the filter can be bypassed, allowing an attacker to access files or directories that should be hidden. This bypass can be exploited locally by an attacker with limited privileges and requires user interaction, such as opening a malicious file or app. The vulnerability enables elevation of privilege, allowing the attacker to gain higher access rights than originally permitted, potentially compromising the confidentiality, integrity, and availability of the device. The issue is categorized under CWE-176 (Improper Handling of Unicode Encoding). Although no patches are currently linked, Google is expected to release fixes given the vulnerability's severity. No known exploits have been reported in the wild at this time, but the flaw's nature suggests it could be leveraged in targeted attacks. The CVSS v3.1 base score is 7.3, indicating a high severity level, with attack vector local, low attack complexity, requiring privileges and user interaction, and impacting all three security properties (C, I, A).

Potential Impact

The vulnerability allows an attacker with local access and limited privileges to bypass file path filters and access sensitive directories, leading to elevation of privilege on the device. This can result in unauthorized access to confidential data, modification or deletion of critical files, and potential disruption of system availability. For organizations, this could mean compromised mobile devices used for corporate communications, data leakage, or lateral movement within a network if the device is connected to enterprise resources. The requirement for user interaction limits mass exploitation but targeted attacks against high-value individuals or organizations remain a significant risk. Given the widespread use of Android devices globally, the impact is broad, affecting personal, enterprise, and government users. The absence of known exploits currently reduces immediate risk but does not eliminate the threat as attackers may develop exploits once patches are released or if the vulnerability is reverse-engineered.

Mitigation Recommendations

Organizations and users should monitor for official patches from Google and apply them promptly once available. Until patches are released, restrict installation of untrusted applications and avoid opening suspicious files or links that could trigger the vulnerability. Employ mobile device management (MDM) solutions to enforce security policies, including limiting local access and controlling app permissions. Regularly audit devices for unusual behavior indicative of privilege escalation attempts. Educate users about the risks of interacting with untrusted content and the importance of timely updates. For enterprises, consider isolating critical Android devices from sensitive networks or data until patched. Developers should review and improve Unicode normalization handling in file path filtering to prevent similar issues in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2024-08-05T14:29:53.937Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b4247d717aace26ab7

Added to database: 10/21/2025, 7:06:28 PM

Last enriched: 2/28/2026, 6:25:53 AM

Last updated: 3/23/2026, 5:12:40 AM

Views: 199

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses