CVE-2021-1036

7.8 HIGH

📋 TL;DR

CVE-2021-1036 is a tapjacking vulnerability in Android's LocationSettingsActivity that allows malicious apps to overlay deceptive UI elements on legitimate system dialogs. This could trick users into granting permissions or performing actions they didn't intend, potentially leading to privilege escalation. Affects Android 9 through 12 devices.

💻 Affected Systems

Products:
  • Android
Versions: Android 9, 10, 11, 12
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All Android devices running affected versions are vulnerable by default. Requires malicious app installation and user interaction.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could trick users into granting dangerous permissions (like accessibility services or device admin rights) leading to complete device compromise, data theft, or ransomware installation.

🟠

Likely Case

Malicious apps could trick users into granting location permissions or other sensitive permissions, enabling tracking, data collection, or further exploitation.

🟢

If Mitigated

With proper security controls and user awareness, the impact is limited to permission abuse rather than full device compromise.

🌐 Internet-Facing: LOW - This is a local client-side vulnerability requiring app installation and user interaction.
🏢 Internal Only: MEDIUM - In enterprise environments, malicious apps could be sideloaded or distributed through internal channels to target specific users.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (tapping on deceptive overlay) and a malicious app with SYSTEM_ALERT_WINDOW permission. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Bulletin January 2022 and later

Vendor Advisory: https://source.android.com/security/bulletin/aaos/2022-01-01

Restart Required: Yes

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Install the January 2022 or later security patch. 3. Reboot device after installation.

🔧 Temporary Workarounds

Disable overlay permission for untrusted apps

android

Prevent apps from drawing over other apps by revoking SYSTEM_ALERT_WINDOW permission

adb shell appops set <package_name> SYSTEM_ALERT_WINDOW deny

Enable Google Play Protect

android

Keep Google Play Protect enabled to detect and block malicious apps using this technique

🧯 If You Can't Patch

  • Educate users about tapjacking risks and to be cautious when granting permissions
  • Implement mobile device management (MDM) policies to restrict app installations and overlay permissions

🔍 How to Verify

Check if Vulnerable:

Check Android version in Settings > About phone > Android version. If version is 9-12 without January 2022 security patch, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android version is patched: Settings > About phone > Android security patch level should show January 2022 or later.

📡 Detection & Monitoring

Log Indicators:

  • Multiple SYSTEM_ALERT_WINDOW permission requests from same app
  • Unexpected permission grants in security logs

Network Indicators:

  • No network indicators - local attack only

SIEM Query:

source="android_security" AND (event="permission_granted" AND permission="android.permission.SYSTEM_ALERT_WINDOW")

🔗 References

📤 Share & Export