Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31328: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2024-31328cvecve-2024-31328
Published: Mon Mar 02 2026 (03/02/2026, 19:02:50 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In broadcastIntentLockedTraced of BroadcastController.java, there is a possible way to launch arbitrary activities from the background on the paired companion phone due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 03/02/2026, 19:33:05 UTC

Technical Analysis

CVE-2024-31328 is a vulnerability identified in the Android operating system, specifically within the BroadcastController.java file's broadcastIntentLockedTraced method. The issue stems from a logic error that improperly handles intent broadcasts, allowing an attacker with local access to launch arbitrary activities on a paired companion phone from the background. This flaw enables an elevation of privilege without requiring additional execution privileges or user interaction, which means an attacker who already has some form of local access can escalate their privileges stealthily. The vulnerability affects Android versions 14 and 16, which include the companion phone feature that links devices for enhanced interoperability. By exploiting this vulnerability, an attacker could bypass normal security controls, potentially gaining unauthorized access to sensitive functions or data on the paired device. Although no public exploits have been reported yet, the nature of the flaw suggests it could be leveraged in targeted attacks, especially in environments where devices are paired and used for critical communications or operations. The absence of a CVSS score indicates that this vulnerability is newly disclosed, but its characteristics warrant a high severity rating due to the impact on confidentiality, integrity, and the ease of exploitation without user interaction.

Potential Impact

The primary impact of CVE-2024-31328 is the local elevation of privilege on Android devices, which can lead to unauthorized execution of arbitrary activities on paired companion phones. This could compromise the confidentiality and integrity of user data and system operations by allowing attackers to bypass security restrictions. Organizations using Android devices for sensitive communications, especially those leveraging companion phone features, may face increased risk of targeted attacks that exploit this vulnerability to gain unauthorized access or control. The stealthy nature of the exploit—requiring no user interaction—raises the risk of unnoticed compromise, potentially facilitating further lateral movement or data exfiltration within corporate environments. While availability impact is less direct, the compromise of device integrity could lead to denial of service or disruption of normal device functions. The lack of known exploits in the wild currently limits immediate widespread impact, but the vulnerability's characteristics make it a significant threat for high-value targets and environments with paired Android devices.

Mitigation Recommendations

To mitigate CVE-2024-31328, organizations should monitor for official patches from Google and apply them promptly once released, especially on devices running Android versions 14 and 16. Until patches are available, restricting local access to devices and limiting the use of companion phone pairing features can reduce exposure. Implementing strict device management policies, including disabling unnecessary background services related to broadcast intents and companion device features, can help minimize attack surface. Employing endpoint detection and response (EDR) tools to monitor for unusual activity related to intent broadcasts or unauthorized activity launches on paired devices is recommended. Additionally, educating users about the risks of granting local access and enforcing strong authentication controls on devices can further reduce exploitation likelihood. Organizations should also review and harden inter-device communication policies to ensure that only trusted devices are paired and that communications are encrypted and authenticated.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2024-03-29T20:12:39.974Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a5e27dd1a09e29cb26d64b

Added to database: 3/2/2026, 7:18:21 PM

Last enriched: 3/2/2026, 7:33:05 PM

Last updated: 3/3/2026, 12:17:31 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses