CVE-2024-32876

8.5 HIGH

📋 TL;DR

CVE-2024-32876 allows arbitrary code execution in NewPipe Android app when users import malicious backup files. The vulnerability affects all users of NewPipe versions 0.13.4 through 0.26.1 who import backup files from untrusted sources.

💻 Affected Systems

Products:
  • NewPipe
Versions: 0.13.4 through 0.26.1
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within affected version range are vulnerable by default when importing backups.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the NewPipe app, data theft, potential Android sandbox escape leading to broader device compromise, and execution of arbitrary malicious code on the device.

🟠

Likely Case

App crash, theft of NewPipe user data (subscriptions, watch history), and limited malicious actions within the app's permissions.

🟢

If Mitigated

No impact if users only import backups from trusted sources or have updated to patched version.

🌐 Internet-Facing: LOW - Requires user interaction to import malicious file, not directly internet-exploitable.
🏢 Internal Only: MEDIUM - Users could be tricked via social engineering to import malicious backups from various sources.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction to import malicious backup file. Attackers need to create specially crafted backup files using Java serialization vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.27.0

Vendor Advisory: https://github.com/TeamNewPipe/NewPipe/security/advisories/GHSA-wxrm-jhpf-vp6v

Restart Required: Yes

Instructions:

1. Update NewPipe to version 0.27.0 or later from official sources (F-Droid or GitHub). 2. Restart the app after update. 3. Avoid importing backup files from untrusted sources.

🔧 Temporary Workarounds

Disable backup import

android

Avoid importing any backup files until patched

No commands - manual app configuration

Use only trusted backups

android

Only import backup files created by yourself or from completely trusted sources

No commands - user behavior

🧯 If You Can't Patch

  • Do not import any backup files from external sources
  • Uninstall NewPipe and use alternative video streaming apps

🔍 How to Verify

Check if Vulnerable:

Check NewPipe version in app settings. If version is between 0.13.4 and 0.26.1 inclusive, you are vulnerable.

Check Version:

Open NewPipe → Settings → About → Check version number

Verify Fix Applied:

Update to version 0.27.0 or later and verify version in app settings.

📡 Detection & Monitoring

Log Indicators:

  • App crashes during backup import
  • Unexpected Java serialization errors
  • Suspicious class loading during backup processing

Network Indicators:

  • No network indicators - exploitation is local file-based

SIEM Query:

Not applicable - local Android app vulnerability

🔗 References

📤 Share & Export