CVE-2024-0015
📋 TL;DR
This CVE describes an intent redirection vulnerability in Android's DreamService component that allows local attackers to launch arbitrary protected activities without user interaction. It enables local privilege escalation from user execution privileges to higher system privileges. Affects Android devices running vulnerable versions of the framework.
💻 Affected Systems
- Android
📦 What is this software?
Android by Google
Android by Google
Android by Google
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attacker to execute arbitrary code with system privileges, access sensitive data, and persist malware.
Likely Case
Local privilege escalation allowing unauthorized access to protected activities and sensitive system functions.
If Mitigated
Limited impact if proper app sandboxing and SELinux policies are enforced, restricting lateral movement.
🎯 Exploit Status
Requires local access and ability to install/execute malicious app; no user interaction needed once app is installed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: January 2024 Android Security Patch
Vendor Advisory: https://source.android.com/security/bulletin/2024-01-01
Restart Required: Yes
Instructions:
1. Apply January 2024 Android Security Patch. 2. Update affected devices through OTA updates. 3. For custom ROMs, apply framework/base commit 2ce1b7fd37273ea19fbbb6daeeaa6212357b9a70.
🔧 Temporary Workarounds
Disable unnecessary system services
androidReduce attack surface by disabling unused system components and services
Restrict app installations
androidOnly install apps from trusted sources and implement app allowlisting
🧯 If You Can't Patch
- Implement strict app vetting and only allow installation from trusted sources
- Enable enhanced security features like SELinux and app sandboxing
🔍 How to Verify
Check if Vulnerable:
Check Android security patch level in Settings > About phone > Android version. If patch level is before January 2024, device is vulnerable.
Check Version:
adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify security patch level shows January 2024 or later in device settings.
📡 Detection & Monitoring
Log Indicators:
- Unusual activity in DreamService component
- Intent redirection attempts to protected activities
Network Indicators:
- Not applicable - local exploitation only
SIEM Query:
Look for DreamService component abuse or intent redirection patterns in Android system logs
🔗 References
- https://android.googlesource.com/platform/frameworks/base/+/2ce1b7fd37273ea19fbbb6daeeaa6212357b9a70
- https://source.android.com/security/bulletin/2024-01-01
- https://android.googlesource.com/platform/frameworks/base/+/2ce1b7fd37273ea19fbbb6daeeaa6212357b9a70
- https://source.android.com/security/bulletin/2024-01-01