CVE-2024-43085

7.8 HIGH

📋 TL;DR

This vulnerability allows an attacker with physical USB access to an Android device to bypass the lock screen and access device contents without authentication. It affects Android devices where the USB debugging or file transfer mode is enabled. The exploit requires no user interaction and works on locked devices.

💻 Affected Systems

Products:
  • Android
Versions: Android versions prior to the November 2024 security update
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Requires USB connection capability; devices with USB debugging disabled may still be vulnerable through MTP/PTP modes.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise including access to personal data, photos, messages, and potentially installing malware without user knowledge.

🟠

Likely Case

Unauthorized access to files and data stored on the device while it's locked, potentially leading to data theft.

🟢

If Mitigated

Limited impact if USB debugging is disabled and device uses strong physical security controls.

🌐 Internet-Facing: LOW - This is a local physical access vulnerability, not remotely exploitable over networks.
🏢 Internal Only: HIGH - Physical access to devices in corporate environments could lead to significant data breaches.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical USB access but no authentication or user interaction. The vulnerability is in the UsbDeviceManager component.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android November 2024 security update

Vendor Advisory: https://source.android.com/security/bulletin/2024-11-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > System update. 2. Install the November 2024 Android security update. 3. Reboot the device after installation.

🔧 Temporary Workarounds

Disable USB debugging

android

Prevents USB debugging mode which could be used in exploitation

Settings > System > Developer options > USB debugging (toggle off)

Disable file transfer over USB

android

Set USB configuration to 'Charging only' mode

When USB connected: Swipe down notification panel > Tap USB notification > Select 'Charging only'

🧯 If You Can't Patch

  • Implement strict physical security controls for devices
  • Disable USB ports through MDM policies or device encryption

🔍 How to Verify

Check if Vulnerable:

Check Android version in Settings > About phone > Android version. If before November 2024 security patch, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows 'November 5, 2024' or later in Settings > About phone > Android security update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual USB connection events while device is locked
  • Multiple failed unlock attempts followed by USB access

Network Indicators:

  • N/A - This is a local physical access vulnerability

SIEM Query:

N/A - Physical access event not typically logged to SIEM

🔗 References

📤 Share & Export