CVE-2024-44100

7.5 HIGH

📋 TL;DR

This vulnerability in the modem component of Google Pixel devices allows unauthorized access to sensitive information. It affects Pixel devices running Android versions before the October 2024 security patch, potentially exposing device data to attackers.

💻 Affected Systems

Products:
  • Google Pixel devices
Versions: Android versions before 2024-10-05 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Pixel devices with vulnerable modem firmware versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive modem data including device identifiers, location information, and potentially intercept communications.

🟠

Likely Case

Information disclosure of device-specific data that could be used for tracking or profiling.

🟢

If Mitigated

Limited impact with proper network segmentation and device security controls in place.

🌐 Internet-Facing: MEDIUM - Requires proximity or network access to the device, but no authentication needed.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this to gather device information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires access to the device's modem interface, which may require physical proximity or network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level 2024-10-05 or later

Vendor Advisory: https://source.android.com/security/bulletin/pixel/2024-10-01

Restart Required: Yes

Instructions:

1. Go to Settings > System > System update. 2. Check for updates. 3. Install the October 2024 security patch. 4. Restart the device when prompted.

🔧 Temporary Workarounds

Disable unnecessary modem features

android

Turn off mobile data and Wi-Fi when not needed to reduce attack surface

Use secure network connections

android

Connect only to trusted Wi-Fi networks and use VPN for sensitive communications

🧯 If You Can't Patch

  • Isolate vulnerable devices on separate network segments
  • Implement strict network access controls and monitor for unusual modem activity

🔍 How to Verify

Check if Vulnerable:

Check Settings > About phone > Android version > Android security patch level. If date is before 2024-10-05, device is vulnerable.

Check Version:

Settings > About phone > Android version

Verify Fix Applied:

Verify Android security patch level shows 2024-10-05 or later after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual modem access attempts
  • Unexpected modem firmware activity
  • Suspicious baseband processor logs

Network Indicators:

  • Anomalous modem communication patterns
  • Unexpected data exfiltration from modem interfaces

SIEM Query:

Search for modem component access logs outside normal patterns or from unauthorized sources

🔗 References

📤 Share & Export