Description
In the SELinux permissions of crash_dump.te, there is a permissions bypass due to a missing restriction. This could lead to a local escalation of privilege, with System privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.0 Android-8.1 Android-9.0 Android ID: A-110107376.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Google Security Research · textlocalandroid
https://www.exploit-db.com/exploits/45379
References (2)
Core 2
Core References
Patch, Vendor Advisory x_refsource_confirm
https://source.android.com/security/bulletin/2018-09-01
Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/45379/
Scores
CVSS v3
7.8
EPSS
0.0004
EPSS Percentile
12.5%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-863
Status
published
Products (3)
google/android
8.0
google/android
8.1
google/android
9.0
Published
Nov 06, 2018
Tracked Since
Feb 18, 2026