CVE-2024-29740

7.4 HIGH

📋 TL;DR

CVE-2024-29740 is an out-of-bounds write vulnerability in the tmu_set_table function of tmu.c in Android's kernel. This allows local attackers to escalate privileges without user interaction or additional execution privileges. The vulnerability affects Google Pixel devices running vulnerable Android versions.

💻 Affected Systems

Products:
  • Google Pixel smartphones
Versions: Android versions prior to the April 2024 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Google Pixel devices with specific kernel configurations. Other Android devices are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root privileges, allowing attackers to install persistent malware, access all user data, and bypass security controls.

🟠

Likely Case

Local privilege escalation enabling attackers to gain elevated permissions, potentially leading to data theft, surveillance, or further system exploitation.

🟢

If Mitigated

Limited impact if devices are fully patched, have SELinux enforcing mode, and follow Android security best practices with minimal local attack surface.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the device.
🏢 Internal Only: HIGH - Malicious apps or users with physical access can exploit this to gain root privileges on vulnerable devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access but no user interaction. The vulnerability is in kernel code, making exploitation more complex than user-space vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level April 2024 or later

Vendor Advisory: https://source.android.com/security/bulletin/pixel/2024-04-01

Restart Required: Yes

Instructions:

1. Check current security patch level in Settings > About phone > Android version. 2. If patch level is before April 2024, go to Settings > System > System update. 3. Download and install the latest security update. 4. Restart the device after installation completes.

🔧 Temporary Workarounds

Disable unnecessary local services

android

Reduce local attack surface by disabling unused apps and services that could be used as entry points.

Enable Google Play Protect

android

Ensure Google Play Protect is active to detect and prevent malicious apps that might exploit this vulnerability.

🧯 If You Can't Patch

  • Restrict physical access to devices and implement strict app installation policies
  • Monitor for suspicious privilege escalation attempts using Android security logging

🔍 How to Verify

Check if Vulnerable:

Check Settings > About phone > Android version > Security patch level. If date is before April 2024, device is vulnerable.

Check Version:

Settings > About phone > Android version

Verify Fix Applied:

After updating, verify Settings > About phone > Android version shows security patch level April 2024 or later.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • SELinux denials for privilege escalation attempts
  • Unexpected root access in system logs

Network Indicators:

  • Unusual outbound connections from device after local compromise

SIEM Query:

source="android_logs" AND ("kernel panic" OR "segfault" OR "out of bounds")

🔗 References

📤 Share & Export