CVE-2024-49747

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in Android's Bluetooth GATT server allows remote attackers to execute arbitrary code without user interaction or elevated privileges. It affects Android devices with vulnerable Bluetooth implementations, potentially compromising device security and data integrity.

💻 Affected Systems

Products:
  • Android
Versions: Android versions prior to January 2025 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Bluetooth to be enabled and device to be within Bluetooth range of attacker. All Android devices with vulnerable Bluetooth stack are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise with remote code execution leading to data theft, surveillance, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Remote code execution allowing attacker to gain control of affected device, access sensitive data, and potentially pivot to other network resources.

🟢

If Mitigated

Limited impact if Bluetooth is disabled or device is isolated from untrusted networks, though risk remains if Bluetooth is enabled.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires proximity (Bluetooth range) but no authentication or user interaction. Attack complexity is medium due to Bluetooth protocol manipulation requirements.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: January 2025 Android Security Patch or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-01-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > System update. 2. Install January 2025 Android Security Patch. 3. Reboot device after installation. 4. Verify patch installation in Settings > About phone > Android security patch level.

🔧 Temporary Workarounds

Disable Bluetooth

android

Turn off Bluetooth to prevent exploitation via this vector

Settings > Connected devices > Connection preferences > Bluetooth > Toggle off

Restrict Bluetooth Visibility

android

Set Bluetooth to non-discoverable mode to reduce attack surface

Settings > Connected devices > Connection preferences > Bluetooth > Device name > Turn off 'Make device discoverable'

🧯 If You Can't Patch

  • Disable Bluetooth completely when not in use
  • Implement network segmentation to isolate vulnerable devices from critical resources

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android security patch level. If earlier than January 2025, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows January 2025 or later in Settings > About phone > Android security patch level.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Bluetooth connection attempts
  • GATT server error logs
  • Process crashes in Bluetooth stack

Network Indicators:

  • Suspicious Bluetooth traffic patterns
  • Multiple failed GATT read requests
  • Unusual Bluetooth device connections

SIEM Query:

source="android_logs" AND (process="bluetooth" OR process="com.android.bluetooth") AND (message="*GATT*" OR message="*read_by_type*") AND severity=ERROR

🔗 References

📤 Share & Export