CVE-2024-34732
Published: 28 January 2025
Summary
CVE-2024-34732 is a high-severity Race Condition (CWE-362) vulnerability in Google Android. Its CVSS base score is 8.4 (High).
Operationally, ranked at the 6.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely installation of vendor patches to remediate the race condition in RGXMMUCacheInvalidate enabling kernel code execution.
Directs vulnerability scanning to detect and prompt remediation of this known kernel driver flaw before local exploitation.
Ensures monitoring and implementation of security bulletins like the Android October 2024 advisory providing patches for this CVE.
NVD Description
In RGXMMUCacheInvalidate of rgxmem.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
Deeper analysisAI
CVE-2024-34732 is a race condition vulnerability in the RGXMMUCacheInvalidate function of rgxmem.c, a component of the Android kernel associated with the PowerVR (RGX) GPU driver. This flaw allows for arbitrary code execution and has a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), mapped to CWE-362 (Concurrent Execution using Shared Resource with Improper Synchronization).
A local attacker requires no special privileges or user interaction to exploit this vulnerability due to its low attack complexity. Successful exploitation enables escalation of privilege within the kernel, potentially granting full control over the affected device with high impacts on confidentiality, integrity, and availability.
The Android Security Bulletin published on October 1, 2024, addresses this issue with patches available at https://source.android.com/security/bulletin/2024-10-01. Security practitioners should ensure devices receive these updates to mitigate the risk.
Details
- CWE(s)