CVE-2019-2215

HIGH KEV

Android Binder Use-After-Free Exploit

Title source: metasploit

Description

A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095

Exploits (35)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalandroid
https://www.exploit-db.com/exploits/48129
exploitdb WORKING POC VERIFIED
by Google Security Research · textlocalandroid
https://www.exploit-db.com/exploits/47463
nomisec WORKING POC 126 stars
by kangtastic · local
https://github.com/kangtastic/cve-2019-2215
nomisec WORKING POC 76 stars
by timwr · local
https://github.com/timwr/CVE-2019-2215
nomisec WRITEUP 65 stars
by sharif-dev · local
https://github.com/sharif-dev/AndroidKernelVulnerability
nomisec WORKING POC 40 stars
by 0xbinder · local
https://github.com/0xbinder/android-kernel-exploitation-lab
nomisec WORKING POC 39 stars
by DimitriFourny · local
https://github.com/DimitriFourny/cve-2019-2215
nomisec WORKING POC 24 stars
by LIznzn · local
https://github.com/LIznzn/CVE-2019-2215
nomisec WORKING POC 13 stars
by stevejubx · local
https://github.com/stevejubx/CVE-2019-2215
nomisec WORKING POC 12 stars
by c3r34lk1ll3r · local
https://github.com/c3r34lk1ll3r/CVE-2019-2215
nomisec WORKING POC 10 stars
by R0rt1z2 · local
https://github.com/R0rt1z2/huawei-unlock
nomisec STUB 6 stars
by qre0ct · poc
https://github.com/qre0ct/android-kernel-exploitation-ashfaq-CVE-2019-2215
nomisec WORKING POC 5 stars
by willboka · local
https://github.com/willboka/CVE-2019-2215-HuaweiP20Lite
nomisec WORKING POC 4 stars
by mutur4 · local
https://github.com/mutur4/CVE-2019-2215
nomisec WORKING POC 3 stars
by llccd · poc
https://github.com/llccd/TempRoot-Huawei
nomisec WORKING POC 3 stars
by Enceka · poc
https://github.com/Enceka/cve-2019-2215-3.18
nomisec WORKING POC 3 stars
by mufidmb38 · local
https://github.com/mufidmb38/CVE-2019-2215
nomisec WORKING POC 3 stars
by Byte-Master-101 · local
https://github.com/Byte-Master-101/CVE-2019-2215
nomisec WORKING POC 2 stars
by mouseos · local
https://github.com/mouseos/cve-2019-2215_SH-M08
nomisec WORKING POC 2 stars
by elbiazo · local
https://github.com/elbiazo/CVE-2019-2215
nomisec WORKING POC 2 stars
by CrackerCat · poc
https://github.com/CrackerCat/Rootsmart-v2.0
nomisec WORKING POC 2 stars
by raystyle · local
https://github.com/raystyle/CVE-2019-2215
nomisec WORKING POC 1 stars
by i-redbyte · local
https://github.com/i-redbyte/android-badbinder-demo
nomisec WORKING POC 1 stars
by nicchongwb · local
https://github.com/nicchongwb/Rootsmart-v2.0
nomisec WORKING POC 1 stars
by ATorNinja · poc
https://github.com/ATorNinja/CVE-2019-2215
gitlab WORKING POC
by ntkernel · local
https://gitlab.com/ntkernel/CVE-2019-2215
nomisec WORKING POC
by XiaozaYa · poc
https://github.com/XiaozaYa/CVE-2019-2215
nomisec WORKING POC
by raymontag · local
https://github.com/raymontag/CVE-2019-2215
nomisec WORKING POC
by codecat007 · poc
https://github.com/codecat007/CVE-2019-2215
vulncheck_xdb WORKING POC
local
https://github.com/enceka/cve-2019-2215-3.18
vulncheck_xdb WORKING POC
local
https://github.com/CrackerCat/cve2019-2215-3.18
metasploit WORKING POC EXCELLENT
by Jann Horn, Maddie Stone, grant-h, timwr · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/android/local/binder_uaf.rb

Scores

CVSS v3 7.8
EPSS 0.5082
EPSS Percentile 97.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2021-11-03
VulnCheck KEV 2019-09-26
InTheWild.io 2019-09-26
ENISA EUVD EUVD-2019-11857
CWE
CWE-416
Status published
Products (50)
canonical/ubuntu_linux 16.04
debian/debian_linux 8.0
google/android
huawei/alp-al00b_firmware < 10.0.0.162\(c00e156r2p4\)
huawei/alp-tl00b_firmware < 10.0.0.162\(c01e156r1p4\)
huawei/anne-al00_firmware < 9.1.0.126\(c00e126r1p7t8\)
huawei/ares-al00b_firmware < 9.1.0.165\(c00e165r2p5t8\)
huawei/ares-al10d_firmware < 9.1.0.165\(c00e165r2p5t8\)
huawei/ares-tl00chw_firmware < 8.2.0.163\(c01r2p1\)
huawei/barca-al00_firmware < 8.0.0.377\(c00\)
... and 40 more
Published Oct 11, 2019
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026