CVE-2024-43096

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Android devices via Bluetooth without user interaction. It affects Android devices with vulnerable Bluetooth implementations. Attackers within Bluetooth range can exploit this to gain control of affected devices.

💻 Affected Systems

Products:
  • Android devices with Bluetooth functionality
Versions: Android versions prior to January 2025 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All Android devices with Bluetooth enabled are vulnerable by default. The vulnerability is in the Bluetooth stack implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing remote code execution, data theft, and persistent backdoor installation.

🟠

Likely Case

Device crash or temporary denial of service, with potential for data exfiltration or malware installation.

🟢

If Mitigated

Limited impact if Bluetooth is disabled or devices are out of range, though exploitation risk remains when Bluetooth is active.

🌐 Internet-Facing: LOW (requires physical proximity via Bluetooth, not internet connectivity)
🏢 Internal Only: HIGH (exploitable within Bluetooth range in office/home environments)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires Bluetooth proximity but no authentication or user interaction. Technical details are in the Android security bulletin.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: January 2025 Android security patch level or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-01-01

Restart Required: No

Instructions:

1. Check for system updates in Settings > System > System update. 2. Install the January 2025 security patch. 3. Verify patch installation in Settings > About phone > Android security patch level.

🔧 Temporary Workarounds

Disable Bluetooth

Android

Turn off Bluetooth when not in use to prevent exploitation

adb shell settings put global bluetooth_on 0
Or manually disable via Settings > Connected devices > Connection preferences > Bluetooth

Restrict Bluetooth visibility

Android

Set Bluetooth to non-discoverable mode to reduce attack surface

adb shell settings put global bluetooth_discoverability 0

🧯 If You Can't Patch

  • Disable Bluetooth completely on all vulnerable devices
  • Implement network segmentation to isolate Bluetooth-enabled devices from critical systems

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android security patch level. If earlier than January 2025, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows January 2025 or later after applying update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Bluetooth connection attempts
  • GATT service anomalies in Bluetooth logs
  • System crashes related to Bluetooth stack

Network Indicators:

  • Suspicious Bluetooth traffic patterns
  • Multiple failed Bluetooth pairing attempts from unknown devices

SIEM Query:

source="android_logs" AND (process="bluetooth" OR process="com.android.bluetooth") AND (message="*gatt_sr*" OR message="*out of bounds*")

🔗 References

📤 Share & Export