In multiple locations, there is a possible way to trick a user into accepting a permission due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
| Software | From | Fixed in |
|---|---|---|
| google / android | 14.0 | 14.0.x |
| google / android | 15.0 | 15.0.x |
| google / android | 16.0 | 16.0.x |