CVE-2024-56191

8.4 HIGH

📋 TL;DR

This vulnerability is an integer overflow in the Wi-Fi driver of Android devices that allows local privilege escalation without user interaction. Attackers with local access can exploit this to gain elevated system privileges. This affects Android devices, particularly Google Pixel Watch models.

💻 Affected Systems

Products:
  • Google Pixel Watch
  • Android devices with affected Wi-Fi driver
Versions: Android versions prior to March 2025 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects dhd_pno.c in Wi-Fi driver; requires local access to device.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full root/system privileges on the device, enabling complete control, data theft, persistence installation, and further network attacks.

🟠

Likely Case

Local attacker escalates privileges to install malicious apps, access sensitive data, or disable security controls on the device.

🟢

If Mitigated

With proper patching and security controls, the vulnerability is eliminated; without patching, isolation and monitoring can detect exploitation attempts.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring physical or local network access to the device.
🏢 Internal Only: HIGH - Any compromised user account or malicious app on the device could exploit this to gain full control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of memory layout; no authentication needed once local access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: March 2025 Android security patch or later

Vendor Advisory: https://source.android.com/docs/security/bulletin/pixel-watch/2025/2025-03-01

Restart Required: No

Instructions:

1. Check for system updates in device settings. 2. Install March 2025 Android security patch. 3. Verify patch installation via security patch level in settings.

🔧 Temporary Workarounds

Disable Wi-Fi scanning features

Android

Disable background Wi-Fi scanning to reduce attack surface

adb shell settings put global wifi_scan_always_enabled 0

🧯 If You Can't Patch

  • Restrict physical access to devices and implement strict app installation policies
  • Monitor for unusual privilege escalation attempts using security monitoring tools

🔍 How to Verify

Check if Vulnerable:

Check security patch level in Settings > About phone > Android version > Security patch level

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows March 2025 or later date

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Wi-Fi driver crash logs
  • Unexpected privilege escalation in audit logs

Network Indicators:

  • Unusual Wi-Fi scanning patterns from device

SIEM Query:

source="android_logs" AND ("dhd_pno" OR "gscan" OR "kernel panic")

🔗 References

📤 Share & Export