CVE-2024-43096
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on Android devices via Bluetooth without user interaction. It affects Android devices with vulnerable Bluetooth implementations. Attackers within Bluetooth range can exploit this to gain control of affected devices.
💻 Affected Systems
- Android devices with Bluetooth functionality
📦 What is this software?
Android by Google
Android by Google
Android by Google
Android by Google
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing remote code execution, data theft, and persistent backdoor installation.
Likely Case
Device crash or temporary denial of service, with potential for data exfiltration or malware installation.
If Mitigated
Limited impact if Bluetooth is disabled or devices are out of range, though exploitation risk remains when Bluetooth is active.
🎯 Exploit Status
Exploitation requires Bluetooth proximity but no authentication or user interaction. Technical details are in the Android security bulletin.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: January 2025 Android security patch level or later
Vendor Advisory: https://source.android.com/security/bulletin/2025-01-01
Restart Required: No
Instructions:
1. Check for system updates in Settings > System > System update. 2. Install the January 2025 security patch. 3. Verify patch installation in Settings > About phone > Android security patch level.
🔧 Temporary Workarounds
Disable Bluetooth
AndroidTurn off Bluetooth when not in use to prevent exploitation
adb shell settings put global bluetooth_on 0
Or manually disable via Settings > Connected devices > Connection preferences > Bluetooth
Restrict Bluetooth visibility
AndroidSet Bluetooth to non-discoverable mode to reduce attack surface
adb shell settings put global bluetooth_discoverability 0
🧯 If You Can't Patch
- Disable Bluetooth completely on all vulnerable devices
- Implement network segmentation to isolate Bluetooth-enabled devices from critical systems
🔍 How to Verify
Check if Vulnerable:
Check Android security patch level in Settings > About phone > Android security patch level. If earlier than January 2025, device is vulnerable.
Check Version:
adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify Android security patch level shows January 2025 or later after applying update.
📡 Detection & Monitoring
Log Indicators:
- Unusual Bluetooth connection attempts
- GATT service anomalies in Bluetooth logs
- System crashes related to Bluetooth stack
Network Indicators:
- Suspicious Bluetooth traffic patterns
- Multiple failed Bluetooth pairing attempts from unknown devices
SIEM Query:
source="android_logs" AND (process="bluetooth" OR process="com.android.bluetooth") AND (message="*gatt_sr*" OR message="*out of bounds*")