CVE-2024-32917

7.1 HIGH

📋 TL;DR

This vulnerability allows local privilege escalation on affected Android Pixel devices through an out-of-bounds write in the DMA controller driver. Attackers can gain elevated privileges without user interaction or additional execution permissions. Only Pixel devices running vulnerable Android versions are affected.

💻 Affected Systems

Products:
  • Google Pixel smartphones
Versions: Android versions prior to June 2024 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Pixel devices with the specific DMA controller implementation. Other Android devices are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to gain root privileges, install persistent malware, access all user data, and bypass security controls.

🟠

Likely Case

Local privilege escalation allowing attackers to elevate from a standard user to system-level privileges, potentially leading to data theft or further system exploitation.

🟢

If Mitigated

Limited impact if devices are fully patched, have strict app sandboxing, and minimal local attack surface.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the device.
🏢 Internal Only: HIGH - Malicious apps or users with physical access could exploit this to gain elevated privileges on vulnerable devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access but no user interaction. The vulnerability is in kernel-space DMA handling, making exploitation non-trivial but feasible for skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: June 2024 Android security patch or later

Vendor Advisory: https://source.android.com/security/bulletin/pixel/2024-06-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > System update. 2. Download and install the June 2024 security patch. 3. Reboot the device after installation completes.

🔧 Temporary Workarounds

Restrict app installations

android

Only install apps from trusted sources like Google Play Store to reduce attack surface

Disable developer options

android

Turn off USB debugging and developer options to prevent local exploitation via ADB

🧯 If You Can't Patch

  • Isolate vulnerable devices from sensitive networks and data
  • Implement strict app whitelisting and monitor for suspicious privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version. If patch level is before June 2024, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify patch level shows 'June 5, 2024' or later in Settings > About phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs related to DMA operations
  • Unexpected privilege escalation in audit logs
  • SELinux denials for unauthorized kernel access

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

Not applicable for typical enterprise SIEM monitoring of Android devices

🔗 References

📤 Share & Export