CVE-2024-40672

8.4 HIGH

📋 TL;DR

This vulnerability allows local attackers to bypass factory reset protections on Android devices, potentially wiping user data without proper authorization. It affects Android devices running vulnerable versions, requiring physical or local access to the device. The exploit doesn't need user interaction or additional permissions.

💻 Affected Systems

Products:
  • Android
Versions: Android versions prior to October 2024 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices that haven't applied October 2024 Android security updates. Factory reset protection (FRP) bypass is the primary concern.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious app or local attacker could perform unauthorized factory reset, wiping all user data, accounts, and settings from the device.

🟠

Likely Case

Malicious app with local access could trigger factory reset without user consent, leading to data loss and device disruption.

🟢

If Mitigated

With proper app sandboxing and security updates, the risk is limited to devices with outdated software or compromised security models.

🌐 Internet-Facing: LOW - Requires local access to device, not exploitable remotely over internet.
🏢 Internal Only: HIGH - Can be exploited by any local app or user with physical access to device.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to device and ability to execute code. No public exploit code available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: October 2024 Android Security Update

Vendor Advisory: https://source.android.com/security/bulletin/2024-10-01

Restart Required: No

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Install October 2024 security patch. 3. Verify patch installation in Settings > About phone > Android security patch level.

🔧 Temporary Workarounds

Disable unknown sources

Android

Prevent installation of malicious apps by disabling installation from unknown sources

Settings > Security > Install unknown apps > Disable for all apps

Enable Google Play Protect

Android

Use built-in malware scanning for apps

Settings > Security > Google Play Protect > Scan device for security threats

🧯 If You Can't Patch

  • Restrict physical access to devices
  • Implement mobile device management (MDM) with app whitelisting

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android security patch level. If earlier than October 2024, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows October 2024 or later in Settings > About phone.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected factory reset events
  • ChooserActivity permission bypass attempts in system logs

Network Indicators:

  • None - local exploit only

SIEM Query:

EventID: (factory_reset OR device_wipe) AND Source: local_app AND NOT User_consent: true

🔗 References

📤 Share & Export