
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2018-9339 is a vulnerability discovered in Android's Parcel.java component, specifically in the writeTypedArrayList and readTypedArrayList functions. The vulnerability was disclosed in June 2018 and affects Android versions 8.0 and 8.1. This type confusion vulnerability could lead to local escalation of privilege without requiring additional execution privileges or user interaction (Android Bulletin).
The vulnerability is classified as a type confusion issue in the Parcel.java component, specifically affecting the writeTypedArrayList and readTypedArrayList functions. It has been assigned a CVSS v3.1 Base Score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The vulnerability is categorized under CWE-843 (Access of Resource Using Incompatible Type) and CWE-704 (Incorrect Type Conversion or Cast) (NVD).
The vulnerability could lead to local escalation of privilege, potentially allowing an attacker to gain elevated access to system resources. The high CVSS score indicates that successful exploitation could result in a complete compromise of confidentiality, integrity, and availability of the affected system (NVD).
The vulnerability was addressed in the Android security patch level 2018-06-01. Users and administrators should ensure their Android devices are updated to a security patch level of 2018-06-01 or later to mitigate this vulnerability (Android Bulletin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."