In assertSafeToStartCustomActivity of AppRestrictionsFragment.java , there is a possible way to exploit a parcel mismatch resulting in a launch anywhere vulnerability due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Android | 13.0 (including) | 13.0 (including) | |
Android | 14.0 (including) | 14.0 (including) | |
Android | 15.0 (including) | 15.0 (including) | |
Android | 16.0 (including) | 16.0 (including) |