CVE-2024-23355

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption in Qualcomm's keymaster component when importing shared keys, potentially leading to arbitrary code execution. It affects Android devices with Qualcomm chipsets. Attackers could exploit this to gain elevated privileges or compromise device security.

💻 Affected Systems

Products:
  • Android devices with Qualcomm chipsets
Versions: Android versions with vulnerable Qualcomm keymaster implementations
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Specific chipset models and Android versions depend on Qualcomm's implementation; check vendor advisory for exact details.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise with kernel-level code execution, allowing complete control over the device, data theft, and persistence.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security restrictions and access sensitive data or system functions.

🟢

If Mitigated

Limited impact if proper sandboxing and SELinux policies are enforced, potentially containing the exploit to the keymaster context.

🌐 Internet-Facing: LOW - Requires local access or malware installation; not directly exploitable over network.
🏢 Internal Only: MEDIUM - Malicious apps or users with physical access could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to execute code; memory corruption vulnerabilities often require specific conditions to exploit reliably.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm August 2024 security bulletin for specific patch versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for your specific chipset
2. Obtain firmware update from device manufacturer
3. Apply security patch through standard Android update process
4. Reboot device to complete installation

🔧 Temporary Workarounds

Restrict keymaster access

android

Limit which applications can access keymaster services through SELinux policies

🧯 If You Can't Patch

  • Isolate affected devices from sensitive networks and data
  • Implement application allowlisting to prevent malicious apps from running

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level and Qualcomm chipset version against August 2024 security bulletin

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level includes August 2024 or later patches

📡 Detection & Monitoring

Log Indicators:

  • Keymaster service crashes
  • Unexpected key import operations
  • SELinux denials related to keymaster

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

source="android" AND (event="keymaster_crash" OR event="selinux_denial" AND target="keymaster")

🔗 References

📤 Share & Export