CVE-2018-9372

7.8 HIGH

📋 TL;DR

CVE-2018-9372 is an out-of-bounds write vulnerability in Android's bootloader that allows local privilege escalation without user interaction. Attackers can exploit this to gain elevated privileges on affected devices. This affects Android devices with vulnerable bootloader implementations.

💻 Affected Systems

Products:
  • Android devices with vulnerable bootloader implementations
Versions: Android versions prior to the June 2018 security patch level
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices where the vulnerable bootloader code is present; impact varies by device manufacturer implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install persistent malware, bypass security mechanisms, and gain full control over the device.

🟠

Likely Case

Local privilege escalation allowing attackers to execute arbitrary code with bootloader privileges, potentially leading to persistent compromise.

🟢

If Mitigated

Limited impact if devices are already patched or have secure boot enabled with verified boot chains.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring physical access or local code execution first.
🏢 Internal Only: MEDIUM - Could be exploited by malicious apps or users with physical access to escalate privileges locally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of bootloader internals; proof-of-concept code exists in security research publications.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level June 2018 or later

Vendor Advisory: https://source.android.com/security/bulletin/2018-06-01

Restart Required: Yes

Instructions:

1. Check for Android system updates in Settings > System > Advanced > System update. 2. Install the June 2018 or later security patch. 3. Reboot device to apply the patch. 4. Verify patch level in Settings > About phone > Android security patch level.

🔧 Temporary Workarounds

Disable bootloader unlocking

android

Prevents unauthorized bootloader modifications that could exploit this vulnerability

fastboot oem lock
fastboot flashing lock

Enable verified boot

android

Ensures boot integrity by verifying bootloader and kernel signatures

adb shell getprop ro.boot.verifiedbootstate

🧯 If You Can't Patch

  • Restrict physical access to devices and implement strict app installation policies
  • Monitor for unusual bootloader activity and implement device integrity checks

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level: Settings > About phone > Android security patch level. If date is before June 2018, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows June 2018 or later date. Check that verified boot is enabled: adb shell getprop ro.boot.verifiedbootstate should return 'green'.

📡 Detection & Monitoring

Log Indicators:

  • Unusual bootloader activity
  • Failed verified boot attempts
  • Unexpected fastboot commands

Network Indicators:

  • Unusual device communication patterns after boot
  • Suspicious ADB connections

SIEM Query:

source="android_logs" AND (event="bootloader_modification" OR event="verified_boot_failure")

🔗 References

📤 Share & Export