Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43095: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2024-43095cvecve-2024-43095
Published: Tue Jan 21 2025 (01/21/2025, 23:04:42 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In multiple locations, there is a possible way to obtain any system permission due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 21:31:01 UTC

Technical Analysis

CVE-2024-43095 is a logic error vulnerability in Google Android versions 12, 12L, 13, 14, and 15 that allows local privilege escalation. The flaw exists in multiple code locations where the system incorrectly grants any system permission to an attacker due to improper permission checks (classified under CWE-203: Information Exposure Through Discrepancy). An attacker with limited privileges on the device can exploit this vulnerability to obtain full system permissions without needing additional execution privileges. However, exploitation requires user interaction, such as convincing the user to perform a specific action that triggers the vulnerability. The vulnerability affects core Android permission management, potentially allowing attackers to bypass security controls, access sensitive data, modify system settings, or disrupt device availability. The CVSS v3.1 base score is 7.8 (high), reflecting the local attack vector with low complexity, low privileges required, no user interaction needed, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the widespread use of affected Android versions. The absence of available patches at the time of publication necessitates immediate attention to mitigation strategies and monitoring for updates from Google.

Potential Impact

This vulnerability can have severe consequences for organizations and individuals relying on affected Android devices. Successful exploitation grants attackers full system permissions, enabling them to bypass security controls, access or exfiltrate sensitive data, install persistent malware, or disrupt device functionality. This threatens confidentiality, integrity, and availability of data and services on compromised devices. Organizations with mobile workforces or BYOD policies face increased risk of data breaches and operational disruptions. The vulnerability could also be leveraged in targeted attacks against high-value individuals or organizations, especially where Android devices are used for sensitive communications or access to corporate resources. The requirement for user interaction limits automated mass exploitation but does not eliminate risk, as social engineering or malicious apps could facilitate triggering the vulnerability. The lack of known exploits in the wild currently reduces immediate threat but does not preclude future exploitation once proof-of-concept code becomes available.

Mitigation Recommendations

1. Monitor official Google Android security bulletins and apply patches promptly once released for affected Android versions (12, 12L, 13, 14, 15). 2. Until patches are available, restrict installation of apps from untrusted sources and enforce strict app permission policies to minimize attack surface. 3. Educate users about the risks of interacting with untrusted content or apps that request excessive permissions. 4. Employ mobile device management (MDM) solutions to enforce security policies, control app installations, and monitor device behavior for anomalies. 5. Use endpoint detection and response (EDR) tools capable of identifying privilege escalation attempts on Android devices. 6. Limit physical access to devices and encourage use of strong authentication to reduce risk of local exploitation. 7. Regularly audit device permissions and remove unnecessary privileges from apps. 8. Prepare incident response plans specific to mobile device compromise scenarios to enable rapid containment and remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2024-08-05T14:29:53.937Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a43d85912abc71d6249e

Added to database: 2/26/2026, 7:51:25 PM

Last enriched: 2/26/2026, 9:31:01 PM

Last updated: 2/26/2026, 11:15:24 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses