CVE-2018-9399

6.7 MEDIUM

📋 TL;DR

CVE-2018-9399 is a local privilege escalation vulnerability in the /proc/driver/wmt_dbg driver that allows attackers to write out of bounds memory. This could enable a local attacker with system execution privileges to gain elevated privileges on affected Android devices. The vulnerability affects certain Android devices, particularly Google Pixel phones.

💻 Affected Systems

Products:
  • Google Pixel
  • Google Pixel XL
  • Google Pixel 2
  • Google Pixel 2 XL
Versions: Android versions prior to 2018-06-05 security patch level
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with the vulnerable wmt_dbg driver. Most Android devices are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains root privileges on the device, potentially compromising all user data, installing persistent malware, or bypassing security controls.

🟠

Likely Case

Malicious app with system privileges escalates to root access, enabling data theft, surveillance, or device takeover.

🟢

If Mitigated

With proper app sandboxing and SELinux policies, impact is limited to the compromised app's context.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring physical or app-based access to the device.
🏢 Internal Only: MEDIUM - Malicious apps or users with physical access could exploit this to gain root privileges on affected devices.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires system execution privileges to trigger. No user interaction needed once the malicious code is running.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level 2018-06-05

Vendor Advisory: https://source.android.com/security/bulletin/pixel/2018-06-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > Advanced > System update. 2. Install the June 2018 security patch. 3. Reboot the device.

🔧 Temporary Workarounds

Disable wmt_dbg driver

linux

Remove or disable the vulnerable driver module

rmmod wmt_dbg
echo 'blacklist wmt_dbg' >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Restrict app installations to trusted sources only via Google Play Protect
  • Implement strict SELinux policies to limit driver access

🔍 How to Verify

Check if Vulnerable:

Check if /proc/driver/wmt_dbg exists and device has Android patch level before 2018-06-05

Check Version:

getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level is 2018-06-05 or later in Settings > About phone

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • SELinux denials for wmt_dbg access
  • Abnormal process privilege escalation

Network Indicators:

  • None - this is a local exploit

SIEM Query:

process:privilege_escalation AND device_model:(Pixel OR Pixel_XL OR Pixel_2 OR Pixel_2_XL)

🔗 References

📤 Share & Export