There is a possible escalation of privilege due to improperly used crypto. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
References
History
Sat, 07 Sep 2024 00:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-347 |

Status: PUBLISHED
Assigner: Google_Devices
Published:
Updated: 2024-09-06T23:00:06.219Z
Reserved: 2024-04-19T15:00:36.580Z
Link: CVE-2024-32911

Updated: 2024-08-02T02:20:35.720Z

Status : Modified
Published: 2024-06-13T21:15:55.173
Modified: 2024-11-21T09:16:00.717
Link: CVE-2024-32911

No data.