PT-2019-3520 · Google+2 · Android+2
Maddie Stone
·
Published
2019-10-04
·
Updated
2026-03-16
·
CVE-2019-2215
CVSS v3.1
7.8
| Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Android versions prior to the fixed version
Description
The issue is related to a use-after-free vulnerability in the Android kernel, specifically in the binder.c driver. This vulnerability allows an elevation of privilege from an application to the Linux kernel, potentially giving an attacker full control over the device. No user interaction is required to exploit this vulnerability, but it does require either the installation of a malicious local application or a separate vulnerability in a network-facing application. There have been reports of malicious apps exploiting this vulnerability, and it has been used in real-world attacks.
Recommendations
As a temporary workaround, consider disabling the vulnerable binder.c driver until a patch is available. Restrict access to the vulnerable Linux kernel to minimize the risk of exploitation. Avoid using the
binder API endpoint until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.Exploit
LPE
Use After Free
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Android
Linux Kernel
Ubuntu