Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-56184 (GCVE-0-2024-56184)
Vulnerability from cvelistv5 – Published: 2025-03-10 18:19 – Updated: 2025-03-11 20:26- Information disclosure
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-56184",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-11T20:25:01.288477Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-11T20:26:59.078Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Android",
"vendor": "Google",
"versions": [
{
"status": "affected",
"version": "Android kernel"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In static long dev_send of tipc_dev_ql, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information disclosure",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-10T18:19:48.793Z",
"orgId": "83238938-5644-45f0-9007-c0392bcf6222",
"shortName": "Google_Devices"
},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2025-03-01"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "83238938-5644-45f0-9007-c0392bcf6222",
"assignerShortName": "Google_Devices",
"cveId": "CVE-2024-56184",
"datePublished": "2025-03-10T18:19:48.793Z",
"dateReserved": "2024-12-18T17:17:02.548Z",
"dateUpdated": "2025-03-11T20:26:59.078Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-56184",
"date": "2026-05-10",
"epss": "0.00031",
"percentile": "0.0913"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-56184\",\"sourceIdentifier\":\"dsap-vuln-management@google.com\",\"published\":\"2025-03-10T19:15:38.983\",\"lastModified\":\"2025-06-27T16:21:56.450\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In static long dev_send of tipc_dev_ql, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\"},{\"lang\":\"es\",\"value\":\"En el dev_send long est\u00e1tico de tipc_dev_ql, existe una posible lectura fuera de los l\u00edmites debido a una comprobaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":5.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.5,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26\"}]}]}],\"references\":[{\"url\":\"https://source.android.com/security/bulletin/pixel/2025-03-01\",\"source\":\"dsap-vuln-management@google.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.1, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-56184\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-11T20:25:01.288477Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"CWE-125 Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-11T20:26:54.675Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Google\", \"product\": \"Android\", \"versions\": [{\"status\": \"affected\", \"version\": \"Android kernel\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://source.android.com/security/bulletin/pixel/2025-03-01\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In static long dev_send of tipc_dev_ql, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Information disclosure\"}]}], \"providerMetadata\": {\"orgId\": \"83238938-5644-45f0-9007-c0392bcf6222\", \"shortName\": \"Google_Devices\", \"dateUpdated\": \"2025-03-10T18:19:48.793Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-56184\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-11T20:26:59.078Z\", \"dateReserved\": \"2024-12-18T17:17:02.548Z\", \"assignerOrgId\": \"83238938-5644-45f0-9007-c0392bcf6222\", \"datePublished\": \"2025-03-10T18:19:48.793Z\", \"assignerShortName\": \"Google_Devices\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
FKIE_CVE-2024-56184
Vulnerability from fkie_nvd - Published: 2025-03-10 19:15 - Updated: 2025-06-27 16:21| URL | Tags | ||
|---|---|---|---|
| dsap-vuln-management@google.com | https://source.android.com/security/bulletin/pixel/2025-03-01 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In static long dev_send of tipc_dev_ql, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En el dev_send long est\u00e1tico de tipc_dev_ql, existe una posible lectura fuera de los l\u00edmites debido a una comprobaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"id": "CVE-2024-56184",
"lastModified": "2025-06-27T16:21:56.450",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-10T19:15:38.983",
"references": [
{
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
],
"url": "https://source.android.com/security/bulletin/pixel/2025-03-01"
}
],
"sourceIdentifier": "dsap-vuln-management@google.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
CERTFR-2025-AVI-0173
Vulnerability from certfr_avis - Published: 2025-03-05 - Updated: 2025-03-05
De multiples vulnérabilités ont été découvertes dans Google Android. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Pixel sans les correctifs de s\u00e9curit\u00e9 du 5 mars 2025",
"product": {
"name": "Pixel",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-20003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20003"
},
{
"name": "CVE-2025-22377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22377"
},
{
"name": "CVE-2024-56186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56186"
},
{
"name": "CVE-2024-56188",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56188"
},
{
"name": "CVE-2024-56184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56184"
},
{
"name": "CVE-2024-56187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56187"
},
{
"name": "CVE-2024-56185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56185"
}
],
"initial_release_date": "2025-03-05T00:00:00",
"last_revision_date": "2025-03-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0173",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-03-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Pixel",
"vendor_advisories": [
{
"published_at": "2025-03-03",
"title": "Bulletin de s\u00e9curit\u00e9 Pixel",
"url": "https://source.android.com/docs/security/bulletin/pixel/2025-03-01?hl=fr"
}
]
}
CERTFR-2026-AVI-0233
Vulnerability from certfr_avis - Published: 2026-03-04 - Updated: 2026-03-04
De multiples vulnérabilités ont été découvertes dans Google Pixel. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Pixel sans le correctif de s\u00e9curit\u00e9 du 3 mars 2026",
"product": {
"name": "Pixel",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-0122",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0122"
},
{
"name": "CVE-2026-0115",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0115"
},
{
"name": "CVE-2025-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36920"
},
{
"name": "CVE-2026-0108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0108"
},
{
"name": "CVE-2026-0118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0118"
},
{
"name": "CVE-2026-0107",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0107"
},
{
"name": "CVE-2026-0123",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0123"
},
{
"name": "CVE-2026-0120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0120"
},
{
"name": "CVE-2025-48611",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48611"
},
{
"name": "CVE-2026-0109",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0109"
},
{
"name": "CVE-2026-0112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0112"
},
{
"name": "CVE-2026-0111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0111"
},
{
"name": "CVE-2026-0116",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0116"
},
{
"name": "CVE-2026-0113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0113"
},
{
"name": "CVE-2024-56184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56184"
},
{
"name": "CVE-2026-0117",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0117"
},
{
"name": "CVE-2026-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0114"
},
{
"name": "CVE-2026-0121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0121"
},
{
"name": "CVE-2026-0119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0119"
},
{
"name": "CVE-2026-0110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0110"
}
],
"initial_release_date": "2026-03-04T00:00:00",
"last_revision_date": "2026-03-04T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0233",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Pixel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Pixel",
"vendor_advisories": [
{
"published_at": "2026-03-02",
"title": "Bulletin de s\u00e9curit\u00e9 Pixel",
"url": "https://source.android.com/docs/security/bulletin/pixel/2026/2026-03-01?hl=fr"
}
]
}
CNVD-2025-14958
Vulnerability from cnvd - Published: 2025-06-30目前厂商已发布升级程序修复该安全问题,详情见厂商官网: https://source.android.com/security/bulletin/pixel/2025-03-01
| Name | Google Android |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2024-56184",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2024-56184"
}
},
"description": "Google Android \u200c\u662f\u7531Google\u516c\u53f8\u5f00\u53d1\u7684\u57fa\u4e8eLinux\u5185\u6838\u7684\u81ea\u7531\u53ca\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u79fb\u52a8\u64cd\u4f5c\u7cfb\u7edf\u3002\n\nGoogle Android\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8etipc_dev_ql\u7684static long dev_send\u4e2d\u8fb9\u754c\u68c0\u67e5\u4e0d\u6b63\u786e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u672c\u5730\u4fe1\u606f\u6cc4\u9732\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u7a0b\u5e8f\u4fee\u590d\u8be5\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u89c1\u5382\u5546\u5b98\u7f51\uff1a\r\nhttps://source.android.com/security/bulletin/pixel/2025-03-01",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-14958",
"openTime": "2025-06-30",
"patchDescription": "Google Android \u200c\u662f\u7531Google\u516c\u53f8\u5f00\u53d1\u7684\u57fa\u4e8eLinux\u5185\u6838\u7684\u81ea\u7531\u53ca\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u79fb\u52a8\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nGoogle Android\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8etipc_dev_ql\u7684static long dev_send\u4e2d\u8fb9\u754c\u68c0\u67e5\u4e0d\u6b63\u786e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u672c\u5730\u4fe1\u606f\u6cc4\u9732\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Google Android\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Google Android"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2024-56184",
"serverity": "\u4f4e",
"submitTime": "2025-03-12",
"title": "Google Android\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}
GHSA-57XQ-WFW8-MH7X
Vulnerability from github – Published: 2025-03-10 21:31 – Updated: 2025-03-11 21:30In static long dev_send of tipc_dev_ql, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
{
"affected": [],
"aliases": [
"CVE-2024-56184"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-03-10T19:15:38Z",
"severity": "MODERATE"
},
"details": "In static long dev_send of tipc_dev_ql, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.",
"id": "GHSA-57xq-wfw8-mh7x",
"modified": "2025-03-11T21:30:33Z",
"published": "2025-03-10T21:31:12Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56184"
},
{
"type": "WEB",
"url": "https://source.android.com/security/bulletin/pixel/2025-03-01"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2026-0589
Vulnerability from csaf_certbund - Published: 2026-03-03 23:00 - Updated: 2026-03-03 23:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2026-03-05
Google / Android
|
Pixel <2026-03-05 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Android Betriebssystem ist eine quelloffene Plattform f\u00fcr mobile Ger\u00e4te. Die Basis bildet der Linux-Kernel.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Google Android Pixel ausnutzen, um sich erweiterte Berechtigungen zu verschaffen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren und vertrauliche Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Android",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0589 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0589.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0589 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0589"
},
{
"category": "external",
"summary": "Pixel Update Bulletin\u2014March 2026 vom 2026-03-03",
"url": "https://source.android.com/docs/security/bulletin/pixel/2026/2026-03-01"
}
],
"source_lang": "en-US",
"title": "Pixel Patchday M\u00e4rz 2026: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-03T23:00:00.000+00:00",
"generator": {
"date": "2026-03-04T12:03:15.520+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0589",
"initial_release_date": "2026-03-03T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-03-03T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Pixel \u003c2026-03-05",
"product": {
"name": "Google Android Pixel \u003c2026-03-05",
"product_id": "T051390"
}
},
{
"category": "product_version",
"name": "Pixel 2026-03-05",
"product": {
"name": "Google Android Pixel 2026-03-05",
"product_id": "T051390-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:pixel__2026-03-05"
}
}
}
],
"category": "product_name",
"name": "Android"
}
],
"category": "vendor",
"name": "Google"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-56184",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2024-56184"
},
{
"cve": "CVE-2025-36920",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2025-36920"
},
{
"cve": "CVE-2025-48611",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2025-48611"
},
{
"cve": "CVE-2026-0107",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0107"
},
{
"cve": "CVE-2026-0108",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0108"
},
{
"cve": "CVE-2026-0109",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0109"
},
{
"cve": "CVE-2026-0110",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0110"
},
{
"cve": "CVE-2026-0111",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0111"
},
{
"cve": "CVE-2026-0112",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0112"
},
{
"cve": "CVE-2026-0113",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0113"
},
{
"cve": "CVE-2026-0114",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0114"
},
{
"cve": "CVE-2026-0115",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0115"
},
{
"cve": "CVE-2026-0116",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0116"
},
{
"cve": "CVE-2026-0117",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0117"
},
{
"cve": "CVE-2026-0118",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0118"
},
{
"cve": "CVE-2026-0119",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0119"
},
{
"cve": "CVE-2026-0120",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0120"
},
{
"cve": "CVE-2026-0121",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0121"
},
{
"cve": "CVE-2026-0122",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0122"
},
{
"cve": "CVE-2026-0123",
"product_status": {
"known_affected": [
"T051390"
]
},
"release_date": "2026-03-03T23:00:00.000+00:00",
"title": "CVE-2026-0123"
}
]
}
WID-SEC-W-2025-0481
Vulnerability from csaf_certbund - Published: 2025-03-04 23:00 - Updated: 2025-03-04 23:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2025-03-05
Google / Android
|
Pixel <2025-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2025-03-05
Google / Android
|
Pixel <2025-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2025-03-05
Google / Android
|
Pixel <2025-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2025-03-05
Google / Android
|
Pixel <2025-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2025-03-05
Google / Android
|
Pixel <2025-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2025-03-05
Google / Android
|
Pixel <2025-03-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android Pixel <2025-03-05
Google / Android
|
Pixel <2025-03-05 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Android Betriebssystem ist eine quelloffene Plattform f\u00fcr mobile Ger\u00e4te. Die Basis bildet der Linux-Kernel.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um sich erweiterte Rechte zu verschaffen, vertrauliche Informationen preiszugeben und einen Denial-of-Service-Zustand auszul\u00f6sen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Android",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0481 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0481.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0481 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0481"
},
{
"category": "external",
"summary": "Pixel Patchday M\u00e4rz 2025 vom 2025-03-04",
"url": "https://source.android.com/docs/security/bulletin/pixel/2025-03-01"
}
],
"source_lang": "en-US",
"title": "Pixel Patchday March 2025: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-03-04T23:00:00.000+00:00",
"generator": {
"date": "2025-03-05T10:08:48.105+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0481",
"initial_release_date": "2025-03-04T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-03-04T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Pixel \u003c2025-03-05",
"product": {
"name": "Google Android Pixel \u003c2025-03-05",
"product_id": "T041580"
}
},
{
"category": "product_version",
"name": "Pixel 2025-03-05",
"product": {
"name": "Google Android Pixel 2025-03-05",
"product_id": "T041580-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:pixel__2025-03-05"
}
}
}
],
"category": "product_name",
"name": "Android"
}
],
"category": "vendor",
"name": "Google"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-20003",
"product_status": {
"known_affected": [
"T041580"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2024-20003"
},
{
"cve": "CVE-2024-56184",
"product_status": {
"known_affected": [
"T041580"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2024-56184"
},
{
"cve": "CVE-2024-56185",
"product_status": {
"known_affected": [
"T041580"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2024-56185"
},
{
"cve": "CVE-2024-56186",
"product_status": {
"known_affected": [
"T041580"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2024-56186"
},
{
"cve": "CVE-2024-56187",
"product_status": {
"known_affected": [
"T041580"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2024-56187"
},
{
"cve": "CVE-2024-56188",
"product_status": {
"known_affected": [
"T041580"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2024-56188"
},
{
"cve": "CVE-2025-22377",
"product_status": {
"known_affected": [
"T041580"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-22377"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.