Cyber Posture

CVE-2018-9434

High

Published: 17 January 2025

Published
17 January 2025
Modified
10 July 2025
KEV Added
Patch
01 July 2018
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0000 0.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2018-9434 is a high-severity Incorrect Default Permissions (CWE-276) vulnerability in Google Android. Its CVSS base score is 7.8 (High).

Operationally, ranked at the 0.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and correction of flaws like the ASLR bypass in Parcel.cpp, directly preventing local privilege escalation exploitation.

prevent

Mandates implementation of memory protection safeguards such as robust ASLR to protect against unauthorized code execution enabled by this vulnerability.

prevent

Ensures secure configuration settings are established and maintained, including enabling and hardening ASLR protections against bypass in Android Parcel functions.

NVD Description

In multiple functions of Parcel.cpp, there is a possible way to bypass address space layout randomization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Deeper analysisAI

CVE-2018-9434 is a vulnerability in multiple functions of Parcel.cpp that enables bypassing address space layout randomization (ASLR). This issue affects Android components handling parcels, as indicated by the associated security bulletin, and could lead to local escalation of privilege without requiring additional execution privileges or user interaction. The vulnerability is classified under CWE-276 and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

A local attacker with low privileges (PR:L) can exploit this vulnerability due to its low attack complexity and lack of need for user interaction. Successful exploitation allows escalation of privilege, potentially granting high-impact access to confidentiality, integrity, and availability by defeating ASLR protections.

The Android security bulletin at https://source.android.com/security/bulletin/pixel/2018-07-01 details patches for affected Pixel devices, providing mitigation through updated firmware and software components.

Details

CWE(s)

Affected Products

google
android
6.0, 6.0.1, 7.0, 7.1.1, 7.1.2

CVEs Like This One

CVE-2018-9401Same product: Google Android
CVE-2024-43769Same product: Google Android
CVE-2024-49744Same product: Google Android
CVE-2024-49735Same product: Google Android
CVE-2024-43765Same product: Google Android
CVE-2024-53835Same product: Google Android
CVE-2024-49732Same product: Google Android
CVE-2024-11624Same product: Google Android
CVE-2024-49737Same product: Google Android
CVE-2024-34730Same product: Google Android

References