Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://source.android.com/security/bulletin/2018-06-01 |
|
Fri, 22 Nov 2024 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:google:android:-:*:*:*:*:*:*:* |
Wed, 20 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android |
|
| Weaknesses | CWE-125 CWE-787 |
|
| CPEs | cpe:2.3:o:google:android:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Google
Google android |
|
| Metrics |
cvssV3_1
|
Tue, 19 Nov 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Mediatek Preloader, there are out of bounds reads and writes due to an exposed interface that allows arbitrary peripheral memory mapping with insufficient blacklisting/whitelisting. This could lead to local elevation of privilege, given physical access to the device with no additional execution privileges needed. User interaction is needed for exploitation. | |
| References |
|
Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2024-11-20T20:04:52.809Z
Reserved: 2018-04-05T00:00:00.000Z
Link: CVE-2018-9371
Updated: 2024-11-20T20:03:43.216Z
Status : Analyzed
Published: 2024-11-19T20:15:27.843
Modified: 2024-11-22T21:25:48.853
Link: CVE-2018-9371
No data.
OpenCVE Enrichment
No data.