CVE-2024-49728
📋 TL;DR
This vulnerability allows a malicious app on an Android device to access media files from other user profiles without permission. It affects Android devices with multiple user profiles enabled. No user interaction is required for exploitation.
💻 Affected Systems
- Android
📦 What is this software?
Android by Google
Android by Google
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
An attacker could access sensitive photos, videos, or documents from other user profiles on the same device, potentially exposing personal or confidential information.
Likely Case
Malicious apps could silently exfiltrate media files from other user profiles, compromising privacy but not system integrity.
If Mitigated
With proper app sandboxing and user profile isolation, impact is limited to media file disclosure within the device.
🎯 Exploit Status
Requires a malicious app to be installed on the device with Bluetooth file transfer permissions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: April 2025 Android Security Patch or later
Vendor Advisory: https://source.android.com/security/bulletin/2025-04-01
Restart Required: No
Instructions:
1. Go to Settings > System > System update. 2. Check for and install the April 2025 security patch. 3. Verify the patch is applied in Settings > About phone > Android security patch level.
🔧 Temporary Workarounds
Disable Bluetooth File Transfer
AndroidPrevent Bluetooth file transfer functionality that could be exploited
Restrict App Permissions
AndroidReview and restrict Bluetooth permissions for untrusted apps
🧯 If You Can't Patch
- Disable multiple user profiles on shared devices
- Use device management policies to restrict Bluetooth file transfer capabilities
🔍 How to Verify
Check if Vulnerable:
Check Android security patch level in Settings > About phone. If before April 2025, device is vulnerable.
Check Version:
adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify Android security patch level shows April 2025 or later in Settings > About phone.
📡 Detection & Monitoring
Log Indicators:
- Unusual Bluetooth file transfer activity between user profiles
- Apps requesting Bluetooth permissions abnormally
Network Indicators:
- Local Bluetooth file transfers between different user contexts
SIEM Query:
source="android_logs" AND (event="bluetooth_file_transfer" AND target_user!=current_user)