CVE-2024-31328: In
CVE-2024-31328
In broadcastIntentLockedTraced of BroadcastController.java, there is a possible way to launch arbitrary activities from the background on the paired companion phone due to a logic error in the code. T...
Overview
A high-severity security vulnerability has been identified in the Android operating system that could allow a malicious app installed on a paired companion phone to take unauthorized control of certain device functions.
In simple terms, due to a flaw in how the system handles certain internal communication signals (called broadcasts), a malicious app running in the background on a connected device-like a paired smartwatch or another phone-can bypass normal restrictions. This flaw enables the app to silently launch any activity on the main phone, potentially taking over the screen or accessing sensitive functions, without the user clicking anything.
Potential Impact
The primary risk is local privilege escalation. A successfully exploited vulnerability could allow an attacker to:
- Launch phishing windows or malicious activities on the victim’s primary phone screen from a paired device.
- Interfere with other apps or system operations.
- Potentially access sensitive data or actions that should require user consent or foreground app status. Exploitation requires a malicious app to be installed on the companion device, but crucially, no user interaction on the main target phone is needed for the attack to proceed, making it stealthy.
This vulnerability is rated as HIGH severity with a CVSS score of 8.8.
Affected Systems
This vulnerability affects Android devices that support and utilize companion device pairing. The specific vulnerable code is within the Android framework. Users should check with their device manufacturer for specific patch availability.
Remediation and Mitigation
For End Users:
- Apply Updates: The most critical action is to install the latest Android security updates as soon as they are made available by your device manufacturer. This vulnerability was addressed in the Android security updates released in April 2024.
- Manage Paired Devices: Be mindful of which companion devices (smartwatches, other phones) you pair with your primary phone. Only pair with trusted devices from reputable sources.
- App Sourcing: Install apps only from official and trusted stores like the Google Play Store, which provides additional security screening.
For IT Administrators (Managing Corporate Devices):
- Prioritize Patching: Ensure all managed Android devices are updated to a security patch level (SPL) of April 2024 or later. Expedite the rollout of this patch due to the high severity and low attack complexity.
- Policy Enforcement: Use Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) solutions to enforce minimum security patch levels and control device pairing policies in enterprise environments where feasible.
- Awareness: Inform users about the importance of promptly accepting system updates and the risks of pairing with untrusted personal companion devices.
Conclusion
CVE-2024-31328 represents a significant risk as it allows unauthorized background activity launch. The definitive mitigation is applying the official Android security patch. Organizations and users should verify their device’s security patch level and update immediately if it is older than April 2024.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
In validateAddingWindowLw of DisplayPolicy.java, there is a possible way for an app to intercept drag-and-drop events due to a missing permission check. This could lead to local escalation of privileg...
A vulnerability has been found in zhanghuanhao LibrarySystem 图书馆管理系统 up to 1.1.1. This impacts an unknown function of the file BookController.java. The manipulation leads to improper access controls. ...
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is possible to obtain arrays containing Function, which allows escaping the sandbox. Given an array containing Function, and Object.fr...
Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function ...
Other Java Vulnerabilities
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is possible to obtain arrays containing Function, which allows escaping the sandbox. Given an array containing Function, and Object.fr...
Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function ...
In DeviceId of DeviceId.java, there is a possible desync in persistence due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. ...
OneUptime is a solution for monitoring and managing online services. Prior to 10.0.18, OneUptime allows project members to run custom Playwright/JavaScript code via Synthetic Monitors to test websites...