CVE-2024-34730

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass user consent requirements when pairing new Bluetooth HID devices, enabling local privilege escalation without requiring user interaction. It affects Android devices with vulnerable Bluetooth implementations. Attackers could connect malicious input devices without the user's knowledge.

💻 Affected Systems

Products:
  • Android devices with vulnerable Bluetooth implementations
Versions: Specific Android versions mentioned in the January 2025 security bulletin
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Devices must have Bluetooth enabled and be in discoverable/pairable mode. The vulnerability is in the Bluetooth HID pairing logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical proximity could pair a malicious Bluetooth keyboard/mouse and execute arbitrary commands with elevated privileges, potentially taking full control of the device.

🟠

Likely Case

Attackers in close proximity could pair Bluetooth input devices to capture keystrokes, inject commands, or perform unauthorized actions on vulnerable Android devices.

🟢

If Mitigated

With Bluetooth disabled or strict Bluetooth security policies enforced, the attack surface is significantly reduced, though physical proximity risks remain.

🌐 Internet-Facing: LOW - This is a local attack requiring Bluetooth proximity, not internet connectivity.
🏢 Internal Only: HIGH - Physical proximity to vulnerable devices enables exploitation without authentication or user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires physical proximity and knowledge of Bluetooth attack techniques, but no user interaction or authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level January 2025 or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-01-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > System update. 2. Install the January 2025 Android security patch. 3. Reboot the device after installation.

🔧 Temporary Workarounds

Disable Bluetooth when not in use

Android

Turn off Bluetooth to prevent unauthorized device pairing attempts

adb shell settings put global bluetooth_on 0
Or manually disable via Settings > Connected devices > Connection preferences > Bluetooth

Enable Bluetooth visibility timeout

Android

Set Bluetooth to be discoverable only for short periods when pairing legitimate devices

Configure via Settings > Connected devices > Connection preferences > Bluetooth > Device visibility

🧯 If You Can't Patch

  • Disable Bluetooth completely on vulnerable devices
  • Implement physical security controls to prevent unauthorized access to device proximity

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version > Security patch level. If before January 2025, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows January 2025 or later after applying updates.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Bluetooth pairing events in system logs
  • Bluetooth HID connections from unknown devices

Network Indicators:

  • Bluetooth MAC addresses attempting repeated pairing
  • Unusual Bluetooth traffic patterns

SIEM Query:

source="android_system" "Bluetooth" "pairing" "HID" NOT device_name="known_device"

🔗 References

📤 Share & Export