CVE-2024-43771
📋 TL;DR
This vulnerability in Android's Bluetooth GATT server allows remote attackers within Bluetooth range to execute arbitrary code without user interaction. It affects Android devices with vulnerable Bluetooth implementations, potentially compromising device security and data.
💻 Affected Systems
- Android devices with Bluetooth functionality
📦 What is this software?
Android by Google
Android by Google
Android by Google
Android by Google
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise with remote code execution, allowing attackers to install malware, steal data, or gain persistent access to the device.
Likely Case
Device crash or instability leading to denial of service, with potential for limited code execution in constrained environments.
If Mitigated
Minimal impact if Bluetooth is disabled or devices are not within attacker proximity; patched devices remain secure.
🎯 Exploit Status
Exploitation requires Bluetooth proximity and knowledge of the vulnerability, but no authentication or user interaction.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Android security patch level 2025-01-01 or later
Vendor Advisory: https://source.android.com/security/bulletin/2025-01-01
Restart Required: No
Instructions:
1. Check for system updates in Settings > System > System update. 2. Install the January 2025 Android security patch. 3. Verify patch installation in Settings > About phone > Android security patch level.
🔧 Temporary Workarounds
Disable Bluetooth
allTurn off Bluetooth when not in use to prevent remote exploitation
adb shell settings put global bluetooth_on 0
Settings > Connected devices > Connection preferences > Bluetooth > Toggle off
Restrict Bluetooth visibility
allSet Bluetooth to non-discoverable mode to reduce attack surface
adb shell settings put global bluetooth_discoverability 0
Settings > Connected devices > Connection preferences > Bluetooth > Device name > Turn off visibility
🧯 If You Can't Patch
- Keep Bluetooth disabled when not actively using Bluetooth devices
- Physically isolate devices from untrusted Bluetooth environments
🔍 How to Verify
Check if Vulnerable:
Check Android security patch level in Settings > About phone > Android security patch level. If earlier than 2025-01-01, device is vulnerable.
Check Version:
adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify Android security patch level shows 2025-01-01 or later in Settings > About phone > Android security patch level.
📡 Detection & Monitoring
Log Indicators:
- Unusual Bluetooth connection attempts from unknown devices
- GATT server errors or crashes in Bluetooth logs
- System instability following Bluetooth interactions
Network Indicators:
- Suspicious Bluetooth traffic patterns
- Unexpected Bluetooth pairing requests
SIEM Query:
source="android_logs" AND ("GATT" OR "gatts_process_read_req") AND ("error" OR "crash" OR "exception")