Increased level of access on the Android OS kernel by the attacker

This vulnerability allows local attackers to escalate privileges on vulnerable installations of Google Android. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the v4l2 driver. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this to escalate privileges in the context of the kernel.
According to ZDI reviews, this vulnerability is affecting the latest versions of Android.

The vulnerability has just been released by ZDI, and no definitive solution has been reported so far, and according to ZDI reviews, the vulnerability is affecting even the latest Android versions. Google is currently taking no action. Offers no security patch to fix this vulnerability and should hopefully fix it in future updates to Android, the only way to prevent an attack now is to restrict interactions with services, meaning that only some users Allowed to be able to communicate with the public internet and Install and update Anti Virus Solution .