CVE-2024-27213

8.4 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in Android's BroadcastSystemMessage function that allows remote code execution without user interaction. Attackers can exploit this to gain local privilege escalation on affected Android devices. The vulnerability affects Pixel devices and potentially other Android implementations.

💻 Affected Systems

Products:
  • Google Pixel devices
  • Android devices with similar service manager implementations
Versions: Android versions prior to March 2024 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Primarily affects Pixel devices as documented in the Pixel-specific bulletin, but similar Android implementations may be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise with attacker gaining root/system privileges, allowing complete control over the device, data exfiltration, and persistence.

🟠

Likely Case

Local privilege escalation allowing attackers to execute arbitrary code with elevated permissions, potentially accessing sensitive data and system resources.

🟢

If Mitigated

Limited impact with proper patch management and security controls in place, though exploitation attempts may still cause system instability.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

No user interaction required for exploitation. The vulnerability is in a core system component, making exploitation potentially reliable once understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: March 2024 Android security patch level

Vendor Advisory: https://source.android.com/security/bulletin/pixel/2024-03-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > System update. 2. Install the March 2024 Android security patch. 3. Reboot the device after installation completes.

🔧 Temporary Workarounds

Disable unnecessary system services

android

Reduce attack surface by disabling non-essential system services that might use BroadcastSystemMessage

🧯 If You Can't Patch

  • Isolate affected devices from untrusted networks and limit network connectivity
  • Implement strict application allowlisting to prevent malicious apps from exploiting the vulnerability

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version. If patch level is earlier than March 2024, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows 'March 5, 2024' or later in Settings > About phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual BroadcastSystemMessage calls in system logs
  • Multiple service manager crashes or restarts
  • Unexpected privilege escalation attempts

Network Indicators:

  • Unusual outbound connections from system processes
  • Suspicious network activity from elevated processes

SIEM Query:

source="android_system_logs" AND ("BroadcastSystemMessage" OR "servicemgr" OR "use-after-free")

🔗 References

📤 Share & Export