CVE-2024-32921

7.4 HIGH

📋 TL;DR

This vulnerability allows local privilege escalation on affected Android devices through an out-of-bounds write in the lwis_fence.c component. Attackers can exploit this without user interaction or additional privileges. Only Pixel devices running specific Android versions are affected.

💻 Affected Systems

Products:
  • Google Pixel devices
Versions: Android versions prior to June 2024 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Pixel devices with specific hardware configurations using the vulnerable lwis component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to gain root privileges, install persistent malware, access all user data, and bypass security controls.

🟠

Likely Case

Local privilege escalation enabling attackers to execute arbitrary code with elevated permissions, potentially leading to data theft or further system compromise.

🟢

If Mitigated

Limited impact if devices are fully patched, have strict app installation policies, and use security features like verified boot.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the device.
🏢 Internal Only: MEDIUM - Malicious apps or compromised user accounts could exploit this vulnerability on internal devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access but no user interaction. The vulnerability is in a kernel-level component, making exploitation non-trivial but feasible for skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: June 2024 Android security patch or later

Vendor Advisory: https://source.android.com/security/bulletin/pixel/2024-06-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > System update. 2. Download and install the June 2024 security patch. 3. Restart the device when prompted. 4. Verify the patch is applied by checking the build number.

🔧 Temporary Workarounds

Restrict app installations

android

Only install apps from trusted sources like Google Play Store to reduce attack surface

Enable Google Play Protect

android

Ensure Google Play Protect is active to detect and block malicious apps

🧯 If You Can't Patch

  • Isolate affected devices from sensitive networks and data
  • Implement strict app installation policies and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version. If patch level is before June 2024, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify the security patch level shows 'June 5, 2024' or later in Settings > About phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Unexpected privilege escalation attempts in audit logs
  • Suspicious process creation with elevated privileges

Network Indicators:

  • Unusual outbound connections from system processes
  • Command and control traffic from privileged contexts

SIEM Query:

source="android_logs" AND (event_type="kernel_panic" OR process_elevation="true")

🔗 References

📤 Share & Export