CVE-2024-43771

8.8 HIGH

📋 TL;DR

This vulnerability in Android's Bluetooth GATT server allows remote attackers within Bluetooth range to execute arbitrary code without user interaction. It affects Android devices with vulnerable Bluetooth implementations, potentially compromising device security and data.

💻 Affected Systems

Products:
  • Android devices with Bluetooth functionality
Versions: Android versions prior to the January 2025 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All Android devices with Bluetooth enabled are vulnerable by default; the vulnerability is in the core Bluetooth stack.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise with remote code execution, allowing attackers to install malware, steal data, or gain persistent access to the device.

🟠

Likely Case

Device crash or instability leading to denial of service, with potential for limited code execution in constrained environments.

🟢

If Mitigated

Minimal impact if Bluetooth is disabled or devices are not within attacker proximity; patched devices remain secure.

🌐 Internet-Facing: LOW - This is a Bluetooth proximity attack requiring physical proximity, not internet connectivity.
🏢 Internal Only: HIGH - Attackers within Bluetooth range (typically ~10 meters) can exploit this without authentication or user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires Bluetooth proximity and knowledge of the vulnerability, but no authentication or user interaction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level 2025-01-01 or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-01-01

Restart Required: No

Instructions:

1. Check for system updates in Settings > System > System update. 2. Install the January 2025 Android security patch. 3. Verify patch installation in Settings > About phone > Android security patch level.

🔧 Temporary Workarounds

Disable Bluetooth

all

Turn off Bluetooth when not in use to prevent remote exploitation

adb shell settings put global bluetooth_on 0
Settings > Connected devices > Connection preferences > Bluetooth > Toggle off

Restrict Bluetooth visibility

all

Set Bluetooth to non-discoverable mode to reduce attack surface

adb shell settings put global bluetooth_discoverability 0
Settings > Connected devices > Connection preferences > Bluetooth > Device name > Turn off visibility

🧯 If You Can't Patch

  • Keep Bluetooth disabled when not actively using Bluetooth devices
  • Physically isolate devices from untrusted Bluetooth environments

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android security patch level. If earlier than 2025-01-01, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows 2025-01-01 or later in Settings > About phone > Android security patch level.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Bluetooth connection attempts from unknown devices
  • GATT server errors or crashes in Bluetooth logs
  • System instability following Bluetooth interactions

Network Indicators:

  • Suspicious Bluetooth traffic patterns
  • Unexpected Bluetooth pairing requests

SIEM Query:

source="android_logs" AND ("GATT" OR "gatts_process_read_req") AND ("error" OR "crash" OR "exception")

🔗 References

📤 Share & Export