CVE-2024-10382

EUVD-2024-33582
There exists a code execution vulnerability in the Car App Android Jetpack Library. CarAppService uses deserialization logic that allows construction of arbitrary java classes. This can lead to arbitrary code execution when combined with specific Java deserialization gadgets. An attacker needs to install a malicious application on victims device to be able to attack any application that uses vulnerable library. We recommend upgrading the library past version 1.7.0-beta02.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 15%
Affected Products (NVD)
VendorProductVersion
googleandroidx.car.app
𝑥
≤ 1.4.0
googleandroidx.car.app
1.7.0:alpha01
googleandroidx.car.app
1.7.0:alpha02
googleandroidx.car.app
1.7.0:beta01
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
googleandroid
1.4.0 ≤
𝑥
< 1.7.0-beta02
ADP
googleandroid
1.4.0 ≤
𝑥
< 1.7.0-beta02
ADP