Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 24 Jul 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:google:android:-:*:*:*:*:*:*:* |
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 25 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-125 | |
| Metrics |
cvssV3_1
|
Fri, 25 Oct 2024 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In ProtocolMiscHwConfigChangeAdapter::GetData() of protocolmiscadapter.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation. | |
| References |
|
Status: PUBLISHED
Assigner: Google_Devices
Published:
Updated: 2024-10-25T14:55:51.007Z
Reserved: 2024-09-16T18:51:44.742Z
Link: CVE-2024-47015
Updated: 2024-10-25T14:55:44.463Z
Status : Analyzed
Published: 2024-10-25T11:15:16.570
Modified: 2025-07-24T15:18:08.673
Link: CVE-2024-47015
No data.
OpenCVE Enrichment
Updated: 2025-07-13T21:07:22Z