CVE-2024-40677

8.4 HIGH

📋 TL;DR

This vulnerability allows local attackers to bypass factory reset protections in Android's Settings app, potentially enabling unauthorized device resets or privilege escalation. It affects Android devices running vulnerable versions where the missing permission check in AdvancedPowerUsageDetail.java can be exploited without user interaction.

💻 Affected Systems

Products:
  • Android
Versions: Android versions prior to October 2024 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Android devices with vulnerable Settings app versions; exploitation requires local access or malicious app installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access or malicious app could factory reset the device without authorization, leading to complete data loss and potential bypass of device security controls.

🟠

Likely Case

Malicious apps could exploit this to reset devices or escalate privileges locally, potentially compromising user data and device integrity.

🟢

If Mitigated

With proper Android security updates and app sandboxing, exploitation would be limited to apps with specific permissions, reducing overall risk.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access or malicious app; no user interaction needed but requires understanding of Android framework internals.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: October 2024 Android Security Patch or later

Vendor Advisory: https://source.android.com/security/bulletin/2024-10-01

Restart Required: No

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Install October 2024 security patch or later. 3. Verify patch installation in Settings > About phone > Android version.

🔧 Temporary Workarounds

Restrict app installations

all

Only install apps from trusted sources like Google Play Store and avoid sideloading unknown apps.

🧯 If You Can't Patch

  • Implement mobile device management (MDM) with strict app whitelisting policies
  • Enable Android Verified Boot and ensure device encryption is active

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version. If patch level is before October 2024, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows October 2024 or later in Settings > About phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected factory reset events in system logs
  • Settings app crash logs related to AdvancedPowerUsageDetail

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

source="android_system" AND (event="factory_reset" OR process="com.android.settings")

🔗 References

📤 Share & Export