CVE-2019-2215
CVE Published | 2019-10-11 |
---|---|
Related CWE(s) | CWE-416: Use After Free |
Related Vendor(s) | canonical, google, huawei, netapp, debian |
Related Product(s) | a320_firmware, stanford-l09_firmware, dura-al00a_firmware, stanford-l09s_firmware, solidfire_baseboard_management_controller_firmware, p20_lite_firmware, columbia-l29d_firmware, cloud_backup, florida-al20b_firmware, neo-al00d_firmware, data_availability_services, a220_firmware, service_processor, sydney-tl00_firmware, columbia-al00a_firmware, c190_firmware, florida-l21_firmware, h410c_firmware, jakarta-al00a_firmware, nova_3_firmware, nova_2s_firmware, leland-l32a_firmware, leland-l21a_firmware, ares-al00b_firmware, berkeley-l09_firmware, aff_baseboard_management_controller_firmware, hci_management_node, debian_linux, alp-tl00b_firmware, lelandp-al00c_firmware, ubuntu_linux, lelandp-l22c_firmware, honor_view_20_firmware, android, bla-al00b_firmware, figo-al00a_firmware, ares-tl00chw_firmware, tony-tl00b_firmware, sydney-al00_firmware, h700s_firmware, tony-al00b_firmware, florida-l03_firmware, a800_firmware, p20_firmware, sydneym-al00_firmware, duke-l09i_firmware, johnson-tl00d_firmware, leland-al10b_firmware, leland-tl10b_firmware, nova_3e_firmware, h500s_firmware, y9_2019_firmware, rhone-al00_firmware, barca-al00_firmware, anne-al00_firmware, h610s_firmware, florida-l22_firmware, yale-tl00b_firmware, bla-tl00b_firmware, fas2750_firmware, yale-al00a_firmware, alp-al00b_firmware, h300s_firmware, steelstore_cloud_integrated_storage, princeton-al10b_firmware, mate_rs_firmware, h410s_firmware, yale-l21a_firmware, bla-l29c_firmware, florida-tl10b_firmware, solidfire, berkeley-tl10_firmware, ares-al10d_firmware, cornell-tl10b_firmware, fas2720_firmware, leland-tl10c_firmware, honor_9i_firmware |
Exploitation Reported (CISA KEV) | 2021-11-03 |
CVSS 3 Base Score | 7.8 (HIGH) |
CVSS 3 Attack Complexity | LOW |
CVSS 3 Attack Vector | LOCAL |
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
Cyber Threat Graph Context
Explore how this CVE relates to the wider threat graph