CVE-2024-0035

7.8 HIGH

📋 TL;DR

This vulnerability in Android's TileLifecycleManager allows malicious apps to launch activities from the background without user interaction due to a missing null check. It enables local privilege escalation, potentially granting unauthorized access to system functions. Affects Android devices with vulnerable versions of the framework.

💻 Affected Systems

Products:
  • Android
Versions: Android versions prior to the February 2024 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices running vulnerable Android framework versions; specific device models depend on manufacturer update schedules.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full system-level privileges, potentially installing persistent malware, accessing sensitive user data, or compromising device integrity.

🟠

Likely Case

Malicious apps escalate privileges to perform unauthorized actions like accessing protected system components or user data without consent.

🟢

If Mitigated

With proper app sandboxing and security updates, impact is limited to isolated app compromise without broader system access.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring app installation, not directly exploitable over the internet.
🏢 Internal Only: MEDIUM - Requires malicious app installation, but once installed, exploitation can occur without user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a malicious app to be installed; no user interaction needed once installed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level February 2024 or later

Vendor Advisory: https://source.android.com/security/bulletin/2024-02-01

Restart Required: Yes

Instructions:

1. Check for system updates in device settings. 2. Install the February 2024 Android security patch. 3. Reboot the device after installation.

🔧 Temporary Workarounds

Disable unknown app installations

android

Prevent installation of apps from unknown sources to reduce risk of malicious app delivery.

Use app allowlisting

android

Restrict app installations to trusted sources only via enterprise mobility management tools.

🧯 If You Can't Patch

  • Isolate vulnerable devices on segmented networks to limit potential lateral movement.
  • Implement strict app vetting policies to prevent installation of potentially malicious applications.

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version. If patch level is before February 2024, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Confirm security patch level shows 'February 1, 2024' or later in device settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual activity launches from background processes in system logs
  • Privilege escalation attempts in security logs

Network Indicators:

  • None - this is a local exploit

SIEM Query:

Search for TileLifecycleManager exceptions or unexpected activity launches in Android system logs.

🔗 References

📤 Share & Export