CVE-2024-27207

9.1 CRITICAL

📋 TL;DR

This vulnerability allows malicious Android apps to bypass broadcast protection mechanisms by exploiting exported broadcast receivers. It affects Android devices, particularly Google Pixel phones, allowing unauthorized apps to intercept or send system broadcasts that should be restricted.

💻 Affected Systems

Products:
  • Google Pixel phones
  • Android devices with similar implementations
Versions: Android versions prior to March 2024 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects devices with the vulnerable broadcast receiver implementation; Pixel devices are confirmed affected per the bulletin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious app gains unauthorized access to sensitive system broadcasts, potentially intercepting authentication tokens, personal data, or executing privileged operations without user consent.

🟠

Likely Case

Malicious apps bypass intended broadcast restrictions to access protected system events or data, compromising user privacy and app security boundaries.

🟢

If Mitigated

With proper app sandboxing and broadcast restrictions, impact is limited to apps with specific permissions, but the bypass still represents a security boundary violation.

🌐 Internet-Facing: MEDIUM - Requires malicious app installation, but apps can be distributed through various channels including third-party stores.
🏢 Internal Only: MEDIUM - Enterprise devices with controlled app stores still face risk from malicious insider apps or compromised legitimate apps.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a malicious app to be installed on the target device; the vulnerability bypasses existing broadcast protection mechanisms.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: March 2024 Android security patch level

Vendor Advisory: https://source.android.com/security/bulletin/pixel/2024-03-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > System update. 2. Install the March 2024 Android security patch. 3. Restart the device after installation completes.

🔧 Temporary Workarounds

Restrict app installations

android

Only install apps from trusted sources like Google Play Store and disable unknown sources installation

Settings > Security > Install unknown apps > Disable for all apps

Review app permissions

android

Regularly audit installed apps and remove unnecessary or suspicious applications

Settings > Apps > [App Name] > Uninstall

🧯 If You Can't Patch

  • Implement mobile device management (MDM) policies to restrict app installations to approved sources only
  • Deploy application allowlisting to prevent unauthorized apps from running on enterprise devices

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version > Security patch level

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows 'March 5, 2024' or later in Settings > About phone

📡 Detection & Monitoring

Log Indicators:

  • Unusual broadcast receiver activity from untrusted apps
  • Permission denial logs for broadcast operations that should be allowed

Network Indicators:

  • Not applicable - local device vulnerability

SIEM Query:

Not applicable for typical SIEM monitoring of mobile devices

🔗 References

📤 Share & Export