CVE-2024-48336

8.4 HIGH

📋 TL;DR

This vulnerability allows a local untrusted app with no special permissions to execute arbitrary code within the Magisk app and escalate privileges to root. It affects Magisk App users running versions before canary 27007. No user interaction is required for exploitation.

💻 Affected Systems

Products:
  • Magisk App
Versions: All versions before canary 27007
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with Magisk installed. Requires a malicious app to be present on the device.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full root compromise of the Android device, allowing attacker to install persistent malware, access all user data, and bypass all security controls.

🟠

Likely Case

Local privilege escalation leading to unauthorized root access, potentially enabling data theft, surveillance, or further system compromise.

🟢

If Mitigated

Limited impact if device has no malicious apps installed and proper app vetting is in place, though risk remains due to silent exploitation.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires a malicious app to be installed on the device, but no user interaction or special permissions are needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: canary 27007 and later

Vendor Advisory: https://github.com/topjohnwu/Magisk/commit/c2eb6039579b8a2fb1e11a753cea7662c07bec02

Restart Required: No

Instructions:

1. Open Magisk App 2. Check for updates 3. Update to canary 27007 or later 4. Reboot device to apply changes

🔧 Temporary Workarounds

Uninstall Magisk

android

Remove Magisk completely to eliminate the vulnerability

Use Magisk app to uninstall Magisk modules and restore original boot image

Restrict app installations

android

Only install apps from trusted sources like Google Play Store

🧯 If You Can't Patch

  • Monitor device for suspicious root access or unexpected privilege escalations
  • Use Android security features like Google Play Protect and verify all installed apps

🔍 How to Verify

Check if Vulnerable:

Check Magisk version in Magisk App settings. If version is below 27007, device is vulnerable.

Check Version:

Open Magisk App → Settings → Check version number

Verify Fix Applied:

Confirm Magisk version is 27007 or higher in Magisk App settings.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected root access by non-system apps
  • Magisk app process spawning unexpected child processes

Network Indicators:

  • Unusual network traffic from Magisk app or root processes

SIEM Query:

process_name:magisk AND (parent_process:untrusted_app OR privilege_escalation:true)

🔗 References

📤 Share & Export