CVE-2024-49724

7.0 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass Android permission checks through a race condition in AccountManagerService, enabling unauthorized access to protected activities. It requires user interaction but no additional privileges, affecting Android devices with vulnerable versions. Local attackers could escalate privileges on compromised devices.

💻 Affected Systems

Products:
  • Android
Versions: Android versions prior to January 2025 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with vulnerable Android versions; requires malicious app installation or physical access

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing unauthorized access to sensitive account data and protected system activities

🟠

Likely Case

Limited privilege escalation allowing access to specific protected activities without proper authorization

🟢

If Mitigated

No impact if patched or proper application sandboxing prevents exploitation

🌐 Internet-Facing: LOW - Requires local access and user interaction
🏢 Internal Only: MEDIUM - Could be exploited by malicious apps or users with physical access

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires race condition exploitation and user interaction; no public exploit details available

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: January 2025 Android Security Patch or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-01-01

Restart Required: No

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Install January 2025 security patch or later. 3. Verify patch installation in Settings > About phone > Android security patch level.

🔧 Temporary Workarounds

Restrict app installations

Android

Prevent installation of untrusted applications from unknown sources

Settings > Security > Unknown sources (disable)

🧯 If You Can't Patch

  • Implement mobile device management (MDM) with strict app whitelisting
  • Monitor for suspicious app behavior and account access attempts

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android security patch level. If before January 2025, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Confirm Android security patch level shows January 2025 or later date

📡 Detection & Monitoring

Log Indicators:

  • Multiple rapid AccountManagerService permission checks
  • Unauthorized activity launches from unprivileged contexts

Network Indicators:

  • None - local vulnerability only

SIEM Query:

android_logs:AccountManagerService AND (permission_denied OR activity_launch) WITHIN 1s

🔗 References

📤 Share & Export