Required CVE Record Information
Description
In multiple locations, there is a possible way to bypass user notification of foreground services due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.