Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43097: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2024-43097cvecve-2024-43097
Published: Thu Jan 02 2025 (01/02/2025, 23:58:26 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In resizeToAtLeast of SkRegion.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:19:16 UTC

Technical Analysis

CVE-2024-43097 is a vulnerability identified in the Android operating system, specifically in the SkRegion.cpp source file's resizeToAtLeast function. The root cause is an integer overflow that leads to an out-of-bounds write condition. This type of memory corruption can allow a local attacker with limited privileges to overwrite memory regions, potentially altering program control flow or corrupting data structures. The vulnerability affects Android versions 12, 12L, 13, 14, and 15, covering a wide range of currently supported and widely deployed Android releases. Exploitation does not require user interaction or elevated execution privileges beyond local access, which means an attacker who has gained limited access to the device (e.g., through a malicious app or compromised user account) could leverage this flaw to escalate privileges to a higher level, such as system or root. The CVSS v3.1 base score is 7.8, reflecting high severity due to the combination of local attack vector, low complexity, required privileges, and the impact on confidentiality, integrity, and availability. The vulnerability is classified under CWE-787, indicating an out-of-bounds write, a critical memory safety issue that can lead to arbitrary code execution or system compromise. Although no public exploits have been reported yet, the vulnerability's characteristics make it a significant risk, especially in environments where local device access is possible. The lack of user interaction requirement further increases the threat level. Organizations relying on Android devices for sensitive operations should monitor for patches and apply them promptly once available.

Potential Impact

The potential impact of CVE-2024-43097 is substantial for organizations worldwide using affected Android versions. Successful exploitation allows a local attacker to escalate privileges, potentially gaining system-level control over the device. This can lead to unauthorized access to sensitive data, installation of persistent malware, disruption of device functionality, and bypassing of security controls. For enterprises, this could mean compromised mobile endpoints, leading to lateral movement within corporate networks or data exfiltration. The vulnerability affects confidentiality, integrity, and availability, making it a comprehensive threat. Given the widespread use of Android devices in both consumer and enterprise environments, the scope of affected systems is large. The ease of exploitation (no user interaction, low complexity) increases the likelihood of attacks, especially in scenarios where devices are shared, lost, or physically accessed by malicious actors. Although no exploits are known in the wild yet, the vulnerability's presence in recent Android versions means attackers may develop exploits soon, emphasizing the need for proactive mitigation.

Mitigation Recommendations

To mitigate CVE-2024-43097, organizations should: 1) Monitor official Google Android security bulletins and apply patches immediately once they are released for affected Android versions (12, 12L, 13, 14, 15). 2) Implement strict application vetting and limit installation of apps from untrusted sources to reduce the risk of local attackers gaining initial access. 3) Employ mobile device management (MDM) solutions to enforce security policies, including restricting developer options and debugging features that could facilitate exploitation. 4) Use runtime protections such as SELinux enforcing mode and address space layout randomization (ASLR) to make exploitation more difficult. 5) Educate users about the risks of installing unknown applications and the importance of device security hygiene. 6) For high-security environments, consider additional endpoint detection and response (EDR) tools capable of detecting anomalous local privilege escalation attempts. 7) Regularly audit device configurations and installed applications to identify potential attack vectors. These steps go beyond generic advice by focusing on reducing the attack surface and preparing for rapid patch deployment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2024-08-05T14:29:53.937Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909214efe7723195e054596

Added to database: 11/3/2025, 9:40:30 PM

Last enriched: 2/26/2026, 11:19:16 PM

Last updated: 3/25/2026, 4:50:02 AM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses