Cyber Posture

CVE-2024-34732

High

Published: 28 January 2025

Published
28 January 2025
Modified
27 June 2025
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.5th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-34732 is a high-severity Race Condition (CWE-362) vulnerability in Google Android. Its CVSS base score is 8.4 (High).

Operationally, ranked at the 6.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely installation of vendor patches to remediate the race condition in RGXMMUCacheInvalidate enabling kernel code execution.

prevent

Directs vulnerability scanning to detect and prompt remediation of this known kernel driver flaw before local exploitation.

prevent

Ensures monitoring and implementation of security bulletins like the Android October 2024 advisory providing patches for this CVE.

NVD Description

In RGXMMUCacheInvalidate of rgxmem.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.

Deeper analysisAI

CVE-2024-34732 is a race condition vulnerability in the RGXMMUCacheInvalidate function of rgxmem.c, a component of the Android kernel associated with the PowerVR (RGX) GPU driver. This flaw allows for arbitrary code execution and has a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), mapped to CWE-362 (Concurrent Execution using Shared Resource with Improper Synchronization).

A local attacker requires no special privileges or user interaction to exploit this vulnerability due to its low attack complexity. Successful exploitation enables escalation of privilege within the kernel, potentially granting full control over the affected device with high impacts on confidentiality, integrity, and availability.

The Android Security Bulletin published on October 1, 2024, addresses this issue with patches available at https://source.android.com/security/bulletin/2024-10-01. Security practitioners should ensure devices receive these updates to mitigate the risk.

Details

CWE(s)

Affected Products

google
android
all versions

CVEs Like This One

CVE-2025-48577Same product: Google Android
CVE-2025-48568Same product: Google Android
CVE-2026-0112Same product: Google Android
CVE-2025-48574Same product: Google Android
CVE-2025-36920Same product: Google Android
CVE-2026-0011Same product: Google Android
CVE-2025-36897Same product: Google Android
CVE-2026-0020Same product: Google Android
CVE-2026-0109Same product: Google Android
CVE-2026-0117Same product: Google Android

References