CVE-2024-49735

7.8 HIGH

📋 TL;DR

This Android vulnerability allows local privilege escalation without user interaction due to resource exhaustion preventing permission persistence. Attackers can gain elevated privileges on affected Android devices. All Android users with vulnerable versions are affected.

💻 Affected Systems

Products:
  • Android
Versions: Android versions prior to January 2025 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects multiple Android components where permission settings are not properly persisted during resource exhaustion scenarios.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install malware, access sensitive data, or maintain persistence as root/system user.

🟠

Likely Case

Local attacker gains elevated privileges to access other apps' data, modify system settings, or install malicious packages.

🟢

If Mitigated

Limited impact with proper patch management and security controls in place.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring physical or local access to the device.
🏢 Internal Only: HIGH - Malicious apps or users with local access can exploit this without additional permissions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access but no user interaction. Resource exhaustion must be triggered to exploit the permission persistence failure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: January 2025 Android Security Patch or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-01-01

Restart Required: No

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Install January 2025 security patch or later. 3. Verify patch installation in Settings > About phone > Android security patch level.

🔧 Temporary Workarounds

Limit local app installations

Android

Restrict installation of untrusted apps to reduce attack surface

Enable 'Install unknown apps' restrictions in Settings > Apps > Special app access

🧯 If You Can't Patch

  • Implement strict app vetting and only install apps from trusted sources like Google Play Store
  • Use mobile device management (MDM) solutions to enforce security policies and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android security patch level. If earlier than January 2025, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows 'January 1, 2025' or later date in Settings > About phone > Android security patch level.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected permission changes in system logs
  • Resource exhaustion events followed by permission modifications
  • Suspicious app behavior attempting to modify system permissions

Network Indicators:

  • Not applicable - local exploit only

SIEM Query:

source="android_system" AND (event_type="permission_change" OR event_type="resource_exhaustion")

🔗 References

📤 Share & Export