
Cloud Vulnerability DB
A community-led vulnerabilities database
In multiple functions of ShortcutService.java, there is a possible creation of a spoofed shortcut due to a missing permission check. This vulnerability, identified as CVE-2018-9469, affects Android versions 7.1.1, 7.1.2, 8.0, 8.1, and 9.0. The vulnerability was disclosed in the September 2018 Android Security Bulletin and could lead to local escalation of privilege in a privileged app with no additional execution privileges needed, though user interaction is required for exploitation (Android Bulletin).
The vulnerability is classified as an Elevation of Privilege (EoP) issue with a High severity rating. It received a CVSS 3.1 Base Score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The vulnerability stems from missing authorization checks in the ShortcutService.java component, which could allow privilege escalation (NVD).
The vulnerability could enable a local malicious application to bypass operating system protections and gain elevated privileges. This could potentially lead to unauthorized access to system resources and sensitive data that would normally be restricted from the application (Android Bulletin).
The vulnerability was addressed in the Android Security Patch Level 2018-09-01. Users should ensure their Android devices are updated to a security patch level of 2018-09-01 or later to protect against this vulnerability. The fix was implemented across affected Android versions 7.1.1 through 9.0 (Android Bulletin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."