CVE-2018-9374

7.8 HIGH

📋 TL;DR

CVE-2018-9374 is an Android permissions bypass vulnerability in the PackageManagerService that allows local privilege escalation. Attackers can install malicious packages with elevated permissions without user interaction. This affects Android devices running vulnerable versions.

💻 Affected Systems

Products:
  • Android
Versions: Android 8.0 and 8.1
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects Pixel and other Android devices running Oreo versions before June 2018 security patch.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing installation of persistent malware with system-level permissions, data theft, and backdoor creation.

🟠

Likely Case

Local attacker gains elevated privileges to install unwanted applications, modify system settings, or access protected data.

🟢

If Mitigated

Limited impact with proper patch management and security controls preventing unauthorized local access.

🌐 Internet-Facing: LOW - Requires local access to device, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Malicious apps or compromised users could exploit locally to escalate privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local execution privileges but no user interaction. Exploit details have been publicly analyzed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level 2018-06-01 or later

Vendor Advisory: https://source.android.com/docs/security/bulletin/pixel/2018-06-01

Restart Required: Yes

Instructions:

1. Check current security patch level in Settings > About phone > Android security patch level. 2. If before 2018-06-01, update via Settings > System > System update. 3. Reboot device after update completes.

🔧 Temporary Workarounds

Restrict local app installation

android

Disable installation from unknown sources to prevent malicious package installation

adb shell settings put secure install_non_market_apps 0

🧯 If You Can't Patch

  • Implement strict application allowlisting to control which apps can be installed
  • Use mobile device management (MDM) to enforce security policies and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone. If date is before 2018-06-01, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Confirm security patch level shows 2018-06-01 or later date after applying update.

📡 Detection & Monitoring

Log Indicators:

  • PackageManagerService logs showing unexpected package installations
  • Security logs with permission escalation attempts

Network Indicators:

  • Unusual network traffic from newly installed applications

SIEM Query:

source="android_logs" AND "PackageManagerService" AND "installPackageLI" AND result="SUCCESS"

🔗 References

📤 Share & Export