CVE-2014-7911

Google Android < 4.4.4 - Access Control

Title source: rule

Description

luni/src/main/java/java/io/ObjectInputStream.java in the java.io.ObjectInputStream implementation in Android before 5.0.0 does not verify that deserialization will result in an object that met the requirements for serialization, which allows attackers to execute arbitrary code via a crafted finalize method for a serialized object in an ArrayMap Parcel within an intent sent to system_service, as demonstrated by the finalize method of android.os.BinderProxy, aka Bug 15874291.

Exploits (6)

nomisec WORKING POC 149 stars
by retme7 · poc
https://github.com/retme7/CVE-2014-7911_poc
nomisec WORKING POC 13 stars
by GeneBlue · poc
https://github.com/GeneBlue/cve-2014-7911-exp
nomisec WORKING POC 9 stars
by heeeeen · poc
https://github.com/heeeeen/CVE-2014-7911poc
nomisec WORKING POC 7 stars
by ele7enxxh · poc
https://github.com/ele7enxxh/CVE-2014-7911
nomisec WORKING POC 2 stars
by koozxcv · poc
https://github.com/koozxcv/CVE-2014-7911-CVE-2014-4322_get_root_privilege
nomisec WORKING POC 1 stars
by koozxcv · poc
https://github.com/koozxcv/CVE-2014-7911

Scores

EPSS 0.8219
EPSS Percentile 99.2%

Details

CWE
CWE-264
Status published
Products (43)
google/android 1.0
google/android 1.1
google/android 1.5
google/android 1.6
google/android 2.0
google/android 2.0.1
google/android 2.1
google/android 2.2 (2 CPE variants)
google/android 2.2.1
google/android 2.2.2
... and 33 more
Published Dec 15, 2014
Tracked Since Feb 18, 2026