Description
In readMetadata of Utils.cpp, there is a possible path traversal bug due to a confused deputy. This could lead to local escalation of privilege when mounting a USB device with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android ID: A-80436257.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Google Security Research · textlocalandroid
https://www.exploit-db.com/exploits/45192
References (3)
Core 3
Core References
Patch, Vendor Advisory x_refsource_confirm
https://source.android.com/security/bulletin/2018-08-01
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1041432
Exploit, Patch, Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/45192/
Scores
CVSS v3
6.8
EPSS
0.0038
EPSS Percentile
59.4%
Attack Vector
PHYSICAL
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-22
Status
published
Products (7)
google/android
6.0
google/android
6.0.1
google/android
7.0
google/android
7.1.1
google/android
7.1.2
google/android
8.0
google/android
8.1
Published
Nov 06, 2018
Tracked Since
Feb 18, 2026