Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-29745: Information disclosure in Google Android

0
Medium
VulnerabilityCVE-2024-29745cvecve-2024-29745
Published: Fri Apr 05 2024 (04/05/2024, 20:02:15 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

there is a possible Information Disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:46:20 UTC

Technical Analysis

CVE-2024-29745 is an information disclosure vulnerability identified in the Android kernel, attributed to the use of uninitialized data (CWE-908). This flaw allows a local attacker with limited privileges (PR:L) to read sensitive information from kernel memory without needing additional execution privileges or user interaction (UI:N). The vulnerability arises because certain kernel code paths fail to properly initialize memory before use, leading to leakage of potentially sensitive data. The CVSS v3.1 base score is 5.5 (medium), reflecting the local attack vector and limited scope. The vulnerability affects Android kernel versions prior to the patch release, impacting devices running these kernels. Exploitation does not affect system integrity or availability but compromises confidentiality by exposing kernel memory contents. No public exploits have been reported, and no patches were available at the time of disclosure, though Google is expected to release fixes. The vulnerability requires local access, so attackers must have some foothold on the device, such as through a compromised app or physical access. This flaw is particularly concerning for environments where sensitive data is processed on Android devices, as it could allow attackers to extract confidential information from kernel memory, potentially including cryptographic keys or personal data. The lack of required user interaction simplifies exploitation once local access is obtained. The vulnerability is categorized under CWE-908 (Use of Uninitialized Resource), indicating a coding oversight in memory handling within the kernel.

Potential Impact

For European organizations, the primary impact of CVE-2024-29745 is the potential leakage of sensitive information from Android devices used within corporate environments. This could include exposure of personal data, cryptographic keys, or other confidential information stored or processed in kernel memory. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on mobile devices for secure communications and data access are at higher risk. The vulnerability does not allow remote exploitation, limiting its scope to attackers with local access, which reduces the risk of widespread automated attacks but increases the threat from insider attacks or compromised devices. The confidentiality breach could facilitate further attacks or data exfiltration, undermining compliance with GDPR and other data protection regulations. Additionally, the inability to immediately patch the vulnerability may prolong exposure. Organizations with Bring Your Own Device (BYOD) policies or extensive mobile workforces should be particularly vigilant. The impact on device integrity and availability is negligible, but the confidentiality compromise warrants prompt attention.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Monitor vendor communications closely and apply Android kernel patches as soon as they become available to eliminate the vulnerability. 2) Restrict local access to Android devices by enforcing strong device authentication and limiting physical access, especially in sensitive environments. 3) Employ mobile device management (MDM) solutions to enforce security policies, detect anomalous local activity, and control app installations to reduce risk of local compromise. 4) Educate users about the risks of installing untrusted applications that could provide local access to attackers. 5) Use encryption and secure key storage mechanisms that minimize sensitive data exposure in kernel memory. 6) Conduct regular security audits and penetration testing focused on local privilege escalation and information disclosure vectors. 7) For high-risk environments, consider isolating critical mobile workloads or using hardened Android versions with enhanced kernel security features. 8) Maintain an incident response plan that includes procedures for handling potential local information disclosure incidents on mobile devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Google_Devices
Date Reserved
2024-03-19T15:02:29.517Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b2247d717aace26a0e

Added to database: 10/21/2025, 7:06:26 PM

Last enriched: 10/21/2025, 7:46:20 PM

Last updated: 10/30/2025, 1:20:29 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats