CVE-2024-43085
📋 TL;DR
This vulnerability allows an attacker with physical USB access to an Android device to bypass the lock screen and access device contents without authentication. It affects Android devices where the USB debugging or file transfer mode is enabled. The exploit requires no user interaction and works on locked devices.
💻 Affected Systems
- Android
📦 What is this software?
Android by Google
Android by Google
Android by Google
Android by Google
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise including access to personal data, photos, messages, and potentially installing malware without user knowledge.
Likely Case
Unauthorized access to files and data stored on the device while it's locked, potentially leading to data theft.
If Mitigated
Limited impact if USB debugging is disabled and device uses strong physical security controls.
🎯 Exploit Status
Exploitation requires physical USB access but no authentication or user interaction. The vulnerability is in the UsbDeviceManager component.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Android November 2024 security update
Vendor Advisory: https://source.android.com/security/bulletin/2024-11-01
Restart Required: Yes
Instructions:
1. Check for system updates in Settings > System > System update. 2. Install the November 2024 Android security update. 3. Reboot the device after installation.
🔧 Temporary Workarounds
Disable USB debugging
androidPrevents USB debugging mode which could be used in exploitation
Settings > System > Developer options > USB debugging (toggle off)
Disable file transfer over USB
androidSet USB configuration to 'Charging only' mode
When USB connected: Swipe down notification panel > Tap USB notification > Select 'Charging only'
🧯 If You Can't Patch
- Implement strict physical security controls for devices
- Disable USB ports through MDM policies or device encryption
🔍 How to Verify
Check if Vulnerable:
Check Android version in Settings > About phone > Android version. If before November 2024 security patch, device is vulnerable.
Check Version:
adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify security patch level shows 'November 5, 2024' or later in Settings > About phone > Android security update.
📡 Detection & Monitoring
Log Indicators:
- Unusual USB connection events while device is locked
- Multiple failed unlock attempts followed by USB access
Network Indicators:
- N/A - This is a local physical access vulnerability
SIEM Query:
N/A - Physical access event not typically logged to SIEM