In CompanionDeviceManagerService.java, there is a...
High severity
Unreviewed
Published
Jul 9, 2024
to the GitHub Advisory Database
•
Updated Dec 17, 2024
Description
Published by the National Vulnerability Database
Jul 9, 2024
Published to the GitHub Advisory Database
Jul 9, 2024
Last updated
Dec 17, 2024
In CompanionDeviceManagerService.java, there is a possible way to pair a companion device without user acceptance due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References