CVE-2024-43763

6.5 MEDIUM

📋 TL;DR

This CVE describes a logic error in Android's Bluetooth GATT server component that allows nearby attackers to cause denial of service without user interaction. The vulnerability affects Android devices with Bluetooth enabled, potentially disrupting Bluetooth functionality. No special privileges are required for exploitation.

💻 Affected Systems

Products:
  • Android
Versions: Android versions prior to January 2025 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with Bluetooth enabled; Android TV, Wear OS, and other Android-based systems may also be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Permanent Bluetooth service disruption requiring device reboot, potentially affecting medical devices, wearables, or IoT devices that rely on Bluetooth connectivity.

🟠

Likely Case

Temporary Bluetooth service disruption affecting device pairing, file transfers, and peripheral connections until service restart.

🟢

If Mitigated

Minimal impact with Bluetooth disabled or devices patched; affected functionality limited to Bluetooth services only.

🌐 Internet-Facing: LOW - Requires physical proximity via Bluetooth, not internet-based exploitation.
🏢 Internal Only: MEDIUM - Within Bluetooth range (typically 10-100 meters), attackers can disrupt services without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires Bluetooth proximity but no authentication or user interaction; attack tools could be developed from public vulnerability details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: January 2025 Android Security Patch Level or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-01-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > System update. 2. Install January 2025 security patch. 3. Reboot device after installation. 4. Verify patch level in Settings > About phone > Android version.

🔧 Temporary Workarounds

Disable Bluetooth

android

Turn off Bluetooth when not in use to prevent exploitation

adb shell settings put global bluetooth_on 0
Or manually disable via Settings > Connected devices > Connection preferences > Bluetooth

Restrict Bluetooth visibility

android

Set Bluetooth to non-discoverable mode to reduce attack surface

adb shell settings put global bluetooth_discoverability 0
Or via Settings > Connected devices > Connection preferences > Bluetooth > Device name

🧯 If You Can't Patch

  • Disable Bluetooth completely for critical devices
  • Implement physical security controls to limit Bluetooth proximity to untrusted devices

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level: Settings > About phone > Android version > Android security patch level. If before January 2025, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows January 2025 or later; test Bluetooth functionality remains stable when receiving malformed GATT requests.

📡 Detection & Monitoring

Log Indicators:

  • Bluetooth service crashes in logcat
  • GATT server error messages
  • Bluetooth stack restart events

Network Indicators:

  • Unusual Bluetooth connection attempts from unknown MAC addresses
  • Malformed Bluetooth Low Energy packets

SIEM Query:

source="android_logs" AND ("Bluetooth" AND ("crash" OR "error" OR "GATT"))

🔗 References

📤 Share & Export