A significant vulnerability in the Android operating system, identified as CVE-2024-31317, has been discovered, allowing attackers to exploit the Zygote process for system-wide code execution and privilege escalation.
This flaw affects devices running Android 11 or older, highlighting a critical security risk in the Android ecosystem.
The Zygote process is a foundational component of Android, responsible for spawning new application and system-level processes.
It runs with system privileges, making it a prime target for attackers seeking elevated access.
The vulnerability arises from how the System Server handles the hidden_api_blacklist_exemptions
setting, which allows certain apps to bypass Android’s hidden API restrictions.
Specifically, the System Server does not properly escape newlines in this setting when passing it to Zygote, enabling attackers to inject arbitrary commands into the Zygote process.
Attackers can exploit this vulnerability using the Android Debug Bridge (ADB) Shell, which possesses the necessary WRITE_SECURE_SETTINGS
permission to modify the hidden_api_blacklist_exemptions
setting.
By injecting malicious commands into this setting, attackers can execute arbitrary code with system-wide privileges.
A proof-of-concept exploit demonstrates how to escalate privileges from the shell user to the system user by injecting a payload that spawns a new process with elevated permissions.
According to the researchers, this process can be configured to execute commands such as launching a persistent shell, allowing attackers to maintain control over the device.
Exploiting this vulnerability can lead to severe consequences, including potential device bootloops if the exploit is not properly cleaned up.
To mitigate these risks, users can restore normal Zygote behavior by deleting the modified hidden_api_blacklist_exemptions
setting via ADB Shell and then rebooting the device.
However, this action will also remove any injected payloads, requiring attackers to repeat the exploitation process to regain elevated access.
The discovery of this vulnerability underscores the importance of securing Android’s core processes and highlights the need for prompt patches to protect against such exploits.
Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.
Microsoft’s Time Travel Debugging (TTD) framework, a powerful tool for recording and replaying Windows program…
In a landmark move to strengthen its position in the rapidly evolving artificial intelligence landscape,…
Apple released iOS 18.4 Beta 3 on March 10, 2025, for developers, with a build…
In a recent exploration of embedded device hacking, a researcher demonstrated how to extract firmware…
North Korean state-sponsored hackers, known as APT37 or ScarCruft, have been employing sophisticated tactics to…
Ragnar Loader, a sophisticated toolkit associated with the Ragnar Locker ransomware group, has been instrumental…