CVE-2024-31317
HIGHGoogle Android - Insecure Deserialization
Title source: ruleDescription
In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITE_SECURE_SETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
Exploits (13)
nomisec
WORKING POC
47 stars
by Anonymous941 · poc
https://github.com/Anonymous941/zygote-injection-toolkit
nomisec
WORKING POC
35 stars
by WebLDix · poc
https://github.com/WebLDix/CVE-2024-31317-PoC-Deployer
nomisec
WORKING POC
2 stars
by mianliupindao · poc
https://github.com/mianliupindao/CVE-2024-31317-PoC-Deployer
Scores
CVSS v3
7.8
EPSS
0.0703
EPSS Percentile
91.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-502
Status
published
Affected Products (4)
google/android
google/android
google/android
google/android
Timeline
Published
Jul 09, 2024
Tracked Since
Feb 18, 2026