CVE-2021-0478

7.8 HIGH

📋 TL;DR

This vulnerability allows local privilege escalation on Android devices by bypassing permission checks. An uncaught exception in the status bar icon update process enables attackers to run foreground services without user notification. Affects Android 8.1 through 11 with user execution privileges required.

💻 Affected Systems

Products:
  • Android
Versions: Android 8.1, 9, 10, 11
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected Android versions are vulnerable by default. Requires user to install and execute malicious app.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains persistent elevated privileges, installs malware, accesses sensitive data, and maintains stealthy persistence on the device.

🟠

Likely Case

Malicious app escalates privileges to run foreground services without user consent, potentially enabling data theft or further exploitation.

🟢

If Mitigated

Limited impact if device is patched, has minimal apps installed, and runs with restricted permissions.

🌐 Internet-Facing: LOW - Requires local access and user execution privileges, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Malicious apps could exploit this if installed, but requires user execution context.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and user to install/execute malicious app. No user interaction needed after initial execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Patch Level 2021-06-01 or later

Vendor Advisory: https://source.android.com/security/bulletin/2021-06-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > Advanced > System update. 2. Install Android Security Patch Level 2021-06-01 or later. 3. Reboot device after installation.

🔧 Temporary Workarounds

Restrict app installations

android

Only install apps from trusted sources like Google Play Store and disable unknown sources installation.

Settings > Security > Install unknown apps > Disable for all apps

Review app permissions

android

Regularly audit and restrict app permissions, especially for apps requesting unusual privileges.

Settings > Apps & notifications > [App name] > Permissions

🧯 If You Can't Patch

  • Implement mobile device management (MDM) with strict app whitelisting
  • Monitor for unusual foreground service activity and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Android version and security patch level in Settings > About phone > Android version and Security patch level.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Security patch level is 2021-06-01 or later in Settings > About phone > Security patch level.

📡 Detection & Monitoring

Log Indicators:

  • Unusual foreground service starts without user interaction
  • Permission denial exceptions in system_server logs
  • StatusBarIconView update failures

Network Indicators:

  • Unusual network traffic from foreground services

SIEM Query:

source="android_logs" AND ("StatusBarIconView" OR "updateDrawable" OR "foreground service" AND "permission")

🔗 References

📤 Share & Export