Cyber Posture

CVE-2024-40669

High

Published: 28 January 2025

Published
28 January 2025
Modified
27 June 2025
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 8.7th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-40669 is a high-severity Use After Free (CWE-416) vulnerability in Google Android. Its CVSS base score is 8.4 (High).

Operationally, ranked at the 8.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification and patching of the use-after-free vulnerability as detailed in the Android security bulletin, directly eliminating the root cause.

prevent

Implements memory safeguards such as address space layout randomization and exploit mitigations that directly counter use-after-free exploitation attempts.

prevent

Enforces process isolation to limit the scope of local privilege escalation from an exploited unprivileged process.

NVD Description

In TBD of TBD, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Deeper analysisAI

CVE-2024-40669 is a use-after-free vulnerability stemming from a race condition in TBD of TBD. It affects Android systems, as documented in the October 2024 Android security bulletin.

A local attacker with no privileges required can exploit this vulnerability without user interaction to achieve local escalation of privilege. The attack has low complexity and results in high impacts to confidentiality, integrity, and availability, reflected in its CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The root cause is mapped to CWE-416 (Use After Free).

The Android security bulletin at https://source.android.com/security/bulletin/2024-10-01 details available patches and mitigation recommendations for affected devices.

Details

CWE(s)

Affected Products

google
android
all versions

CVEs Like This One

CVE-2025-0084Same product: Google Android
CVE-2025-22403Same product: Google Android
CVE-2025-0074Same product: Google Android
CVE-2024-40651Same product: Google Android
CVE-2025-48543Same product: Google Android
CVE-2025-22409Same product: Google Android
CVE-2025-0075Same product: Google Android
CVE-2024-40670Same product: Google Android
CVE-2025-22404Same product: Google Android
CVE-2025-22410Same product: Google Android

References