CVE-2024-32915
📋 TL;DR
This CVE describes an out-of-bounds read vulnerability in the CellInfoListParserV2::FillCellInfo() function of protocolnetadapter.cpp in Android's baseband firmware. It could allow local information disclosure, but requires baseband firmware compromise for exploitation. This primarily affects Google Pixel devices running vulnerable Android versions.
💻 Affected Systems
- Google Pixel devices
📦 What is this software?
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
Local attacker with baseband firmware compromise could read sensitive memory contents, potentially exposing cryptographic keys, authentication tokens, or other protected data.
Likely Case
Limited information disclosure requiring significant attacker foothold; most likely used as part of a broader attack chain rather than standalone exploitation.
If Mitigated
With proper security controls and patching, risk is minimal as exploitation requires baseband compromise which is difficult to achieve.
🎯 Exploit Status
Exploitation requires baseband firmware compromise which is technically challenging; no user interaction needed but attacker must already have significant device access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: June 2024 Android security patch level
Vendor Advisory: https://source.android.com/security/bulletin/pixel/2024-06-01
Restart Required: Yes
Instructions:
1. Go to Settings > System > System update on Pixel device. 2. Download and install June 2024 security update. 3. Restart device when prompted.
🔧 Temporary Workarounds
Disable unnecessary baseband features
androidReduce attack surface by disabling unused cellular features if possible
🧯 If You Can't Patch
- Isolate affected devices from sensitive networks and data
- Implement strict access controls and monitoring for devices that cannot be patched
🔍 How to Verify
Check if Vulnerable:
Check Android security patch level in Settings > About phone > Android version; if before June 2024, device is vulnerable.
Check Version:
adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify security patch level shows 'June 5, 2024' or later in Settings > About phone > Android version.
📡 Detection & Monitoring
Log Indicators:
- Unusual baseband firmware activity
- Memory access violations in system logs
Network Indicators:
- Anomalous baseband communication patterns
SIEM Query:
Search for baseband firmware modification events or memory access violations on Android devices