Cyber Posture

CVE-2024-43097

High

Published: 03 January 2025

Published
03 January 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0091 76.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-43097 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Google Android. Its CVSS base score is 7.8 (High).

Operationally, ranked in the top 24.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely patching and remediation of the integer overflow vulnerability in Skia as specified in the Android Security Bulletin.

prevent

Provides comprehensive memory protections that mitigate out-of-bounds writes caused by the integer overflow in resizeToAtLeast.

detect

Supports identification of the Skia vulnerability through vulnerability scanning and monitoring from sources like security bulletins.

NVD Description

In resizeToAtLeast of SkRegion.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Deeper analysisAI

CVE-2024-43097 is an out-of-bounds write vulnerability stemming from an integer overflow in the resizeToAtLeast function within SkRegion.cpp of the Skia graphics library. This issue affects the Android platform, where Skia is integrated as an external component. Assigned CWE-787, it carries a CVSS v3.1 base score of 7.8 (High), reflecting its local attack vector, low attack complexity, requirement for low privileges, lack of user interaction, and high impacts on confidentiality, integrity, and availability.

A local attacker with low privileges (PR:L) can exploit this vulnerability without additional execution privileges or user interaction. Successful exploitation enables escalation of privilege, potentially granting higher-level access on the affected Android device and compromising sensitive data or system integrity due to the out-of-bounds write.

Mitigation is addressed in the Android Security Bulletin for December 2024, which details patches for affected versions. The specific fix is implemented in Skia via commit 8d355fe1d0795fc30b84194b87563f75c6f8f2a7. Debian LTS users are also notified in the March 2025 announcement to apply corresponding updates.

Details

CWE(s)

Affected Products

google
android
12.0, 12.1, 13.0, 14.0, 15.0

CVEs Like This One

CVE-2026-0010Same product: Google Android
CVE-2026-0113Same product: Google Android
CVE-2024-49749Same product: Google Android
CVE-2024-53838Same product: Google Android
CVE-2026-0122Same product: Google Android
CVE-2024-49748Same product: Google Android
CVE-2025-36937Same product: Google Android
CVE-2026-0111Same product: Google Android
CVE-2026-0123Same product: Google Android
CVE-2026-0116Same product: Google Android

References