Possible Bypass of File Path Filter Leads to Local Escalation of Privilege
CVE-2024-43093
Key Information:
Badges
What is CVE-2024-43093?
CVE-2024-43093 is a vulnerability associated with an External Storage Provider, which is integral for managing data storage in various applications. This particular flaw arises from a bypass of a file path filter, specifically within the shouldHideDocument function of ExternalStorageProvider.java. The vulnerability stems from an incorrect implementation of unicode normalization, which may allow unauthorized access to sensitive directories. Such a lapse in security poses significant risks to organizations, as it could facilitate local privilege escalation, enabling an attacker to gain higher access levels without needing additional execution privileges.
Technical Details
The core issue with CVE-2024-43093 lies in the improper handling of file path filters in the External Storage Provider. The bypass enables malicious actors to exploit the unicode normalization failure to access restricted directories. Although user interaction is necessary for the exploitation to occur, the nature of the vulnerability could be manipulated by an attacker to gain unauthorized control over the system’s resources.
Potential impact of CVE-2024-43093
-
Local Escalation of Privileges: Successful exploitation allows attackers to escalate their privileges locally, which can lead to unauthorized access to sensitive files and operations within the affected system.
-
Data Exposure: The ability to bypass file path filters may result in unauthorized access to confidential data, increasing the risk of data breaches and compromising sensitive information.
-
Increased Attack Surface: Organizations may face heightened risk as this vulnerability could be leveraged alongside other exploits or configurations, potentially leading to broader system compromises and more extensive security ramifications.
CISA Reported
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.
The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Affected Version(s)
Android 15
Android 14
Android 13
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles

Android zero-day vulnerabilities actively abused. Update as soon as you can
Android's March 2025 security update includes two zero-days which are under active exploitation in targeted attacks.
4 days ago
Google Confirms 2 New Android Zero Day Exploits—Update Now
Update your Android device now as Google confirms two zero day vulnerabilities already exploited by attackers.
5 days ago
Google's March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities
Google’s March 2025 Android Security Bulletin fixes 44 vulnerabilities, including two actively exploited flaws.
6 days ago
References
CVSS V3.1
Timeline
- 💰
Used in Ransomware
- 📈
Vulnerability started trending
Vulnerability published
- 🦅
CISA Reported
- 🟡
Public PoC available
- 👾
Exploit known to exist
- 📰
First article discovered by SecurityWeek