CVE-2024-31317

HIGH

Google Android - Insecure Deserialization

Title source: rule

Description

In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITE_SECURE_SETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.

Exploits (13)

nomisec WORKING POC 64 stars
by fuhei · poc
https://github.com/fuhei/CVE-2024-31317
nomisec WORKING POC 47 stars
by Anonymous941 · poc
https://github.com/Anonymous941/zygote-injection-toolkit
nomisec WORKING POC 35 stars
by WebLDix · poc
https://github.com/WebLDix/CVE-2024-31317-PoC-Deployer
nomisec WORKING POC 23 stars
by wqry085 · poc
https://github.com/wqry085/PoC-Deployer-System
nomisec WRITEUP 18 stars
by agg23 · poc
https://github.com/agg23/cve-2024-31317
nomisec WORKING POC 7 stars
by CleoV2 · poc
https://github.com/CleoV2/Debuggable-App-Exploit
nomisec WORKING POC 3 stars
by fcy10012 · poc
https://github.com/fcy10012/CVE-2024-31317-Deployer
nomisec WORKING POC 2 stars
by rifting · poc
https://github.com/rifting/Zygotroller
nomisec WORKING POC 2 stars
by mianliupindao · poc
https://github.com/mianliupindao/CVE-2024-31317-PoC-Deployer
nomisec WORKING POC
by chengfeng30121 · poc
https://github.com/chengfeng30121/CVE-2024-31317-PoC
nomisec WORKING POC
by GitAmanS · poc
https://github.com/GitAmanS/ZygoteExploitDemo
nomisec WORKING POC
by jmywh1 · poc
https://github.com/jmywh1/CVE-2024-31317
nomisec WORKING POC
by kalibb · poc
https://github.com/kalibb/CVE-2024-31317-Deployer

Scores

CVSS v3 7.8
EPSS 0.0703
EPSS Percentile 91.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-502
Status published

Affected Products (4)

google/android
google/android
google/android
google/android

Timeline

Published Jul 09, 2024
Tracked Since Feb 18, 2026