CVE-2024-0021
📋 TL;DR
This vulnerability allows an app in the Android work profile to improperly enable notification listener services due to a logic error in NotificationAccessConfirmationActivity.java. This could lead to local privilege escalation without requiring additional execution privileges, though user interaction is needed for exploitation. Affected systems are Android devices with work profiles enabled.
💻 Affected Systems
- Android Settings app
📦 What is this software?
Android by Google
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
An attacker could gain notification listener access, potentially intercepting sensitive notifications, reading messages, and accessing protected content from other apps.
Likely Case
Malicious apps in work profiles could gain unauthorized access to notifications from personal profile apps, leading to data leakage.
If Mitigated
With proper app vetting and work profile management, the risk is limited to notification access rather than full system compromise.
🎯 Exploit Status
Requires user interaction and app installation in work profile. The logic error allows bypassing intended restrictions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: January 2024 Android security patch level
Vendor Advisory: https://source.android.com/security/bulletin/2024-01-01
Restart Required: Yes
Instructions:
1. Apply January 2024 Android security patch. 2. Update Android OS to latest version. 3. Restart device after update.
🔧 Temporary Workarounds
Disable work profiles
androidTemporarily disable Android work profiles to prevent exploitation
Navigate to Settings > Accounts > Work profile > Remove work profile
Restrict notification access
androidReview and revoke notification listener permissions for all apps
Navigate to Settings > Apps & notifications > Special app access > Notification access
🧯 If You Can't Patch
- Implement strict app vetting for work profile installations
- Monitor for unusual notification access requests in work profile apps
🔍 How to Verify
Check if Vulnerable:
Check Android security patch level in Settings > About phone > Android version. If patch level is before January 2024, device is vulnerable.
Check Version:
adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify Android security patch level shows January 2024 or later in Settings > About phone > Android version.
📡 Detection & Monitoring
Log Indicators:
- Unexpected notification access grants to work profile apps
- Multiple notification listener permission requests
Network Indicators:
- No network indicators - local privilege escalation
SIEM Query:
Look for EventID related to notification access changes or package manager permission grants
🔗 References
- https://android.googlesource.com/platform/packages/apps/Settings/+/53ea491d276f9a7c586c7983c08105a9bb7051f1
- https://source.android.com/security/bulletin/2024-01-01
- https://android.googlesource.com/platform/packages/apps/Settings/+/53ea491d276f9a7c586c7983c08105a9bb7051f1
- https://source.android.com/security/bulletin/2024-01-01