Skip to main content

CVE-2024-46941: CWE-281 Improper Preservation of Permissions in vivo SystemUI

Medium
VulnerabilityCVE-2024-46941cvecve-2024-46941cwe-281
Published: Fri Jun 06 2025 (06/06/2025, 03:24:32 UTC)
Source: CVE Database V5
Vendor/Project: vivo
Product: SystemUI

Description

SystemUI has an incorrect component protection setting, which allows access to specific information.

AI-Powered Analysis

AILast updated: 07/07/2025, 17:40:02 UTC

Technical Analysis

CVE-2024-46941 is a medium-severity vulnerability identified in the SystemUI component of vivo devices, specifically affecting versions below 14.0.8.120. The root cause of this vulnerability is an improper preservation of permissions (CWE-281), meaning that the SystemUI component has incorrect component protection settings. This misconfiguration allows unauthorized access to specific information that should otherwise be restricted. The vulnerability does not require privileges or authentication (PR:N), but does require user interaction (UI:P), such as the user opening or interacting with a malicious app or content. The attack vector is local (AV:L), indicating that an attacker needs local access to the device, for example by installing a malicious app or exploiting another local vector. The impact is limited primarily to confidentiality (VC:L), with no direct impact on integrity or availability. The vulnerability scope is limited (SC:L), and there is no indication of privilege escalation or system-wide compromise. No known exploits are currently reported in the wild, and no patches have been linked yet. The CVSS 4.0 base score is 4.8, reflecting a medium risk level. This vulnerability could potentially allow an attacker to access sensitive information exposed by SystemUI, such as notifications, UI elements, or other system information that could be leveraged for further attacks or privacy violations. Given the nature of SystemUI as a core user interface component on vivo Android devices, this vulnerability could be exploited by malicious local apps or attackers with temporary physical access to the device, especially if the user is tricked into interacting with malicious content.

Potential Impact

For European organizations, the impact of CVE-2024-46941 depends largely on the prevalence of vivo devices within their workforce or customer base. Organizations that issue vivo smartphones to employees or have BYOD policies allowing vivo devices could face risks related to leakage of sensitive information displayed or managed by SystemUI. This could include exposure of notifications containing confidential data, or UI elements that reveal internal system states. While the vulnerability does not allow remote exploitation or privilege escalation, it could be leveraged in targeted attacks involving social engineering or malicious apps to gain unauthorized access to information. This could lead to privacy breaches, information leakage, or facilitate subsequent attacks such as phishing or lateral movement. Sectors with high data sensitivity such as finance, healthcare, or government entities in Europe could be particularly concerned if vivo devices are in use. However, the limited attack vector and medium severity reduce the likelihood of widespread impact. The absence of known exploits in the wild currently lowers immediate risk, but organizations should remain vigilant and prepare for patch deployment once available.

Mitigation Recommendations

To mitigate CVE-2024-46941, European organizations should: 1) Inventory and identify all vivo devices in use, focusing on those running SystemUI versions below 14.0.8.120. 2) Restrict installation of untrusted or unknown applications on these devices to reduce the risk of local exploitation via malicious apps. 3) Educate users about the risks of interacting with suspicious content or apps that could trigger this vulnerability. 4) Monitor for updates from vivo and apply patches promptly once released, as no official patch links are currently available. 5) Employ mobile device management (MDM) solutions to enforce security policies, including app whitelisting and permission controls. 6) Consider isolating or limiting the use of vulnerable devices in sensitive environments until patched. 7) Conduct regular security assessments and penetration tests focusing on mobile device security to detect potential exploitation attempts. These steps go beyond generic advice by emphasizing device inventory, user education, and proactive patch management tailored to the specific vulnerability and device ecosystem.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Vivo
Date Reserved
2024-09-15T22:07:33.094Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 684263cf182aa0cae2fe1948

Added to database: 6/6/2025, 3:43:11 AM

Last enriched: 7/7/2025, 5:40:02 PM

Last updated: 8/6/2025, 12:28:49 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats