there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
Metrics
Affected Vendors & Products
References
History
Tue, 21 Oct 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 29 Nov 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs |
Wed, 14 Aug 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | CWE-755 |
Status: PUBLISHED
Assigner: Google_Devices
Published: 2024-04-05T20:02:16.425Z
Updated: 2025-10-21T23:05:21.822Z
Reserved: 2024-03-19T15:05:26.954Z
Link: CVE-2024-29748
Updated: 2024-08-02T01:10:55.524Z
Status : Analyzed
Published: 2024-04-05T20:15:08.407
Modified: 2025-10-24T13:45:29.210
Link: CVE-2024-29748
No data.