Cyber Posture

CVE-2018-9464

High

Published: 18 January 2025

Published
18 January 2025
Modified
10 July 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2018-9464 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Google Android. Its CVSS base score is 7.8 (High).

Operationally, ranked at the 6.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-25 (Reference Monitor) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 mandates enforcement of approved authorizations for access to system resources like protected files, directly addressing the missing permission check exploited in this CVE.

prevent

AC-25 requires a reference monitor to mediate all access attempts and enforce policy, mitigating the lack of permission checks that enable unauthorized file reads.

prevent

AC-6 enforces least privilege to limit low-privilege attackers' access to protected files, reducing the potential for escalation even if checks are bypassed.

NVD Description

In multiple locations, there is a possible way to read protected files due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Deeper analysisAI

CVE-2018-9464 involves a missing permission check in multiple locations that enables reading protected files, stemming from CWE-125 (Out-of-bounds Read). This vulnerability affects Android Pixel devices, as detailed in the associated security bulletin. It carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high impact potential from local access.

A local attacker with low privileges (PR:L) can exploit this issue without requiring user interaction or additional execution privileges. Successful exploitation leads to local escalation of privilege, allowing high confidentiality, integrity, and availability impacts through unauthorized access to protected files.

The Android Pixel security bulletin at https://source.android.com/security/bulletin/pixel/2018-08-01 provides patch information and mitigation guidance for affected devices.

Details

CWE(s)

Affected Products

google
android
all versions

CVEs Like This One

CVE-2024-53834Same product: Google Android
CVE-2025-48530Same product: Google Android
CVE-2026-0035Same product: Google Android
CVE-2026-0106Same product: Google Android
CVE-2025-48574Same product: Google Android
CVE-2025-36920Same product: Google Android
CVE-2026-0011Same product: Google Android
CVE-2025-36897Same product: Google Android
CVE-2026-0020Same product: Google Android
CVE-2026-0109Same product: Google Android

References