Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54968 | In apk-versions.txt, there is a possible corruption of telemetry opt-in settings on other watches when setting up a new Pixel Watch due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. |
| Link | Providers |
|---|---|
| https://source.android.com/security/bulletin/wear/2025-02-01 |
|
Fri, 05 Sep 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* |
Fri, 05 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-266 | |
| Metrics |
cvssV3_1
|
Fri, 05 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android Google pixel Watch |
|
| Vendors & Products |
Google
Google android Google pixel Watch |
Thu, 04 Sep 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In apk-versions.txt, there is a possible corruption of telemetry opt-in settings on other watches when setting up a new Pixel Watch due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | |
| References |
|
Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2026-02-26T17:49:15.593Z
Reserved: 2024-10-18T00:37:14.970Z
Link: CVE-2024-49731
Updated: 2025-09-05T15:23:48.377Z
Status : Analyzed
Published: 2025-09-04T20:15:33.573
Modified: 2025-09-05T19:08:43.963
Link: CVE-2024-49731
No data.
OpenCVE Enrichment
Updated: 2025-09-05T14:02:08Z
EUVD