CVE-2024-0024
📋 TL;DR
This vulnerability in Android's UserManagerService allows local attackers to bypass user restrictions through improper input validation, potentially escalating privileges without additional permissions. Exploitation requires user interaction. Affects Android devices running vulnerable versions.
💻 Affected Systems
- Android
📦 What is this software?
Android by Google
Android by Google
Android by Google
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains elevated privileges, potentially accessing restricted data or system functions they shouldn't have access to.
Likely Case
Malicious app circumvents user-imposed restrictions to access protected data or functionality.
If Mitigated
Proper app sandboxing and security updates prevent exploitation, maintaining normal user restriction enforcement.
🎯 Exploit Status
Requires user interaction and local access; exploitation details not publicly documented.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: May 2024 Android Security Patch or later
Vendor Advisory: https://source.android.com/security/bulletin/2024-05-01
Restart Required: Yes
Instructions:
1. Check for system updates in Settings > System > System update. 2. Install May 2024 security patch or later. 3. Reboot device after installation.
🔧 Temporary Workarounds
Disable multiple user profiles
androidRemove additional user profiles to reduce attack surface
Settings > System > Multiple users > Remove additional users
🧯 If You Can't Patch
- Restrict physical access to devices
- Monitor for suspicious app behavior and restrict app installations
🔍 How to Verify
Check if Vulnerable:
Check Android security patch level in Settings > About phone > Android version > Security patch level
Check Version:
adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify security patch level shows May 2024 or later date
📡 Detection & Monitoring
Log Indicators:
- Unexpected user restriction changes in system logs
- Suspicious UserManagerService method calls
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="android_system" AND "UserManagerService" AND ("restriction" OR "privilege")
🔗 References
- https://android.googlesource.com/platform/frameworks/base/+/6a9250ec7fc9801a883cedd7860076f42fb518ac
- https://source.android.com/security/bulletin/2024-05-01
- https://android.googlesource.com/platform/frameworks/base/+/6a9250ec7fc9801a883cedd7860076f42fb518ac
- https://source.android.com/security/bulletin/2024-05-01