High (8.8)

CVE-2024-31328: In

CVE-2024-31328

In broadcastIntentLockedTraced of BroadcastController.java, there is a possible way to launch arbitrary activities from the background on the paired companion phone due to a logic error in the code. T...

Affected: Java

Overview

A high-severity security vulnerability has been identified in the Android operating system that could allow a malicious app installed on a paired companion phone to take unauthorized control of certain device functions.

In simple terms, due to a flaw in how the system handles certain internal communication signals (called broadcasts), a malicious app running in the background on a connected device-like a paired smartwatch or another phone-can bypass normal restrictions. This flaw enables the app to silently launch any activity on the main phone, potentially taking over the screen or accessing sensitive functions, without the user clicking anything.

Potential Impact

The primary risk is local privilege escalation. A successfully exploited vulnerability could allow an attacker to:

  • Launch phishing windows or malicious activities on the victim’s primary phone screen from a paired device.
  • Interfere with other apps or system operations.
  • Potentially access sensitive data or actions that should require user consent or foreground app status. Exploitation requires a malicious app to be installed on the companion device, but crucially, no user interaction on the main target phone is needed for the attack to proceed, making it stealthy.

This vulnerability is rated as HIGH severity with a CVSS score of 8.8.

Affected Systems

This vulnerability affects Android devices that support and utilize companion device pairing. The specific vulnerable code is within the Android framework. Users should check with their device manufacturer for specific patch availability.

Remediation and Mitigation

For End Users:

  1. Apply Updates: The most critical action is to install the latest Android security updates as soon as they are made available by your device manufacturer. This vulnerability was addressed in the Android security updates released in April 2024.
  2. Manage Paired Devices: Be mindful of which companion devices (smartwatches, other phones) you pair with your primary phone. Only pair with trusted devices from reputable sources.
  3. App Sourcing: Install apps only from official and trusted stores like the Google Play Store, which provides additional security screening.

For IT Administrators (Managing Corporate Devices):

  1. Prioritize Patching: Ensure all managed Android devices are updated to a security patch level (SPL) of April 2024 or later. Expedite the rollout of this patch due to the high severity and low attack complexity.
  2. Policy Enforcement: Use Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) solutions to enforce minimum security patch levels and control device pairing policies in enterprise environments where feasible.
  3. Awareness: Inform users about the importance of promptly accepting system updates and the risks of pairing with untrusted personal companion devices.

Conclusion

CVE-2024-31328 represents a significant risk as it allows unauthorized background activity launch. The definitive mitigation is applying the official Android security patch. Organizations and users should verify their device’s security patch level and update immediately if it is older than April 2024.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Java Vulnerabilities

View all Java vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.