CVE-2024-27229

7.5 HIGH

📋 TL;DR

This vulnerability is a null pointer dereference in Android's call barring component that could allow remote attackers to cause denial of service without user interaction. It affects Android devices, particularly Google Pixel phones, by crashing the telephony service when processing malicious messages.

💻 Affected Systems

Products:
  • Android
  • Google Pixel phones
Versions: Android versions prior to March 2024 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the ss_CallBarring.c component in telephony stack.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker could crash the telephony service, disrupting phone calls and SMS functionality until device reboot.

🟠

Likely Case

Denial of service affecting phone call and messaging capabilities on vulnerable devices.

🟢

If Mitigated

No impact if patched; limited impact if device is not internet-facing.

🌐 Internet-Facing: MEDIUM - Exploitable remotely but requires specific telephony message handling.
🏢 Internal Only: LOW - Requires telephony network access which is typically external.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

No user interaction needed but requires sending specific telephony messages.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: March 2024 Android security patch

Vendor Advisory: https://source.android.com/security/bulletin/pixel/2024-03-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > System update. 2. Install March 2024 Android security patch. 3. Reboot device after installation.

🔧 Temporary Workarounds

Network-level filtering

all

Filter suspicious telephony messages at network level

🧯 If You Can't Patch

  • Restrict device network access to trusted telephony networks only
  • Monitor for telephony service crashes and restart service if needed

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows March 2024 or later

📡 Detection & Monitoring

Log Indicators:

  • Telephony service crashes
  • Null pointer exceptions in ss_CallBarring.c

Network Indicators:

  • Unusual telephony message patterns

SIEM Query:

source="android_logs" AND ("ss_CallBarring" OR "telephony crash")

🔗 References

📤 Share & Export