CVE-2024-49731
📋 TL;DR
This vulnerability allows telemetry opt-in settings corruption on other Pixel Watches when setting up a new watch, potentially enabling local privilege escalation. It affects Pixel Watch users who set up new devices while other watches are present. User interaction is required for exploitation.
💻 Affected Systems
- Google Pixel Watch
📦 What is this software?
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
An attacker with physical access could escalate privileges on a compromised watch, potentially accessing sensitive data or functionality beyond normal user permissions.
Likely Case
Accidental corruption of telemetry settings on other watches during normal setup, causing privacy configuration issues without malicious intent.
If Mitigated
With proper access controls and user awareness, impact is limited to telemetry settings corruption without data compromise.
🎯 Exploit Status
Requires physical access to a watch and user interaction during setup process.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: February 2025 security patch for Wear OS
Vendor Advisory: https://source.android.com/security/bulletin/wear/2025-02-01
Restart Required: No
Instructions:
1. Open Settings on Pixel Watch
2. Navigate to System > System updates
3. Check for and install available updates
4. Ensure February 2025 security patch is installed
🔧 Temporary Workarounds
Isolate watch setup
allSet up new Pixel Watches in isolation from other watches to prevent telemetry settings corruption
🧯 If You Can't Patch
- Physically separate watches during setup procedures
- Monitor for unexpected telemetry settings changes on existing watches
🔍 How to Verify
Check if Vulnerable:
Check Wear OS version in Settings > System > About > Versions. If before February 2025 patch, device is vulnerable.
Check Version:
Not applicable - check via watch Settings interface
Verify Fix Applied:
Verify February 2025 security patch is installed in Settings > System > System updates > Last update.
📡 Detection & Monitoring
Log Indicators:
- Unexpected telemetry opt-in/opt-out events in system logs
- Multiple watch setup events in proximity
Network Indicators:
- Unusual telemetry data transmission patterns
SIEM Query:
Not applicable for typical consumer watch deployments