CVE-2024-49740

5.5 MEDIUM

📋 TL;DR

This CVE describes a resource exhaustion vulnerability in Android that can cause crash loops, leading to local denial of service. Attackers can exploit this without user interaction or elevated privileges. The vulnerability affects Android devices running vulnerable versions.

💻 Affected Systems

Products:
  • Android OS
Versions: Android versions prior to March 2025 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects multiple components in frameworks/base and services/Telephony packages. All Android devices running vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Persistent denial of service rendering the device unusable until reboot, potentially requiring factory reset if system components are affected.

🟠

Likely Case

Temporary service disruption affecting specific applications or system components until the crash loop is resolved.

🟢

If Mitigated

Minimal impact with proper resource monitoring and crash recovery mechanisms in place.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring physical or local network access to the device.
🏢 Internal Only: MEDIUM - Malicious apps or compromised internal users could exploit this to disrupt device functionality.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting malicious input to trigger resource exhaustion. No authentication needed but requires local access or malicious app installation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: March 2025 Android Security Patch or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-03-01

Restart Required: No

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Apply the March 2025 security patch or later. 3. Verify patch installation in Settings > About phone > Android version.

🔧 Temporary Workarounds

Resource monitoring and limits

all

Implement resource usage monitoring and limits to prevent exhaustion scenarios

🧯 If You Can't Patch

  • Implement strict app vetting and only install applications from trusted sources
  • Use mobile device management (MDM) solutions to monitor for abnormal resource consumption

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version. If patch level is earlier than March 2025, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows March 2025 or later in Settings > About phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Frequent application crashes, system component restarts, abnormal resource consumption patterns in system logs

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Search for repeated crash events from Android system components or applications within short timeframes

🔗 References

📤 Share & Export