CVE-2018-9380

8.8 HIGH

📋 TL;DR

CVE-2018-9380 is an out-of-bounds write vulnerability in Android's Bluetooth L2CAP protocol implementation that could allow remote code execution. Attackers could potentially gain elevated privileges on affected devices by sending specially crafted Bluetooth packets. This affects Android devices running vulnerable versions, particularly Pixel and Nexus devices.

💻 Affected Systems

Products:
  • Android
  • Google Pixel
  • Google Nexus
Versions: Android 8.0 and 8.1
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Primarily affects Pixel and Nexus devices, but other Android devices using similar Bluetooth stacks may be vulnerable. Requires Bluetooth to be enabled and device to be discoverable or paired.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains full system control over affected Android device via Bluetooth, potentially installing malware, stealing data, or bricking the device.

🟠

Likely Case

Local attacker within Bluetooth range executes arbitrary code with elevated privileges, compromising device security and user data.

🟢

If Mitigated

Attack fails due to Bluetooth being disabled, device not being discoverable, or patch being applied.

🌐 Internet-Facing: LOW - Requires Bluetooth proximity, not internet connectivity.
🏢 Internal Only: MEDIUM - Attack requires physical proximity via Bluetooth, but could be exploited in office environments or public spaces.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction (Bluetooth pairing/connection) and proximity. No public exploit code available as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level 2018-06-05 or later

Vendor Advisory: https://source.android.com/docs/security/bulletin/pixel/2018-06-01

Restart Required: Yes

Instructions:

1. Go to Settings > System > System update. 2. Check for updates. 3. Install Android security patch level 2018-06-05 or later. 4. Restart device after installation.

🔧 Temporary Workarounds

Disable Bluetooth

Android

Turn off Bluetooth when not in use to prevent exploitation.

adb shell settings put global bluetooth_on 0
Settings > Connected devices > Connection preferences > Bluetooth > Toggle off

Disable Device Discoverability

Android

Make device non-discoverable to Bluetooth scans.

Settings > Connected devices > Connection preferences > Bluetooth > Device name > Turn off 'Make device discoverable'

🧯 If You Can't Patch

  • Disable Bluetooth completely when not in use
  • Avoid pairing with unknown Bluetooth devices
  • Use device in areas with controlled Bluetooth access

🔍 How to Verify

Check if Vulnerable:

Check Settings > About phone > Android security patch level. If date is before 2018-06-05, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level is 2018-06-05 or later in Settings > About phone.

📡 Detection & Monitoring

Log Indicators:

  • Bluetooth stack crashes in logcat
  • Unexpected Bluetooth connection attempts from unknown devices
  • Suspicious L2CAP protocol errors

Network Indicators:

  • Unusual Bluetooth packet patterns
  • Multiple failed Bluetooth pairing attempts
  • Malformed L2CAP packets in Bluetooth traffic

SIEM Query:

source="android_logs" AND "bluetooth" AND ("crash" OR "error" OR "l2c_lcc_proc_pdu")

🔗 References

📤 Share & Export