Cyber Posture

CVE-2024-53838

High

Published: 03 January 2025

Published
03 January 2025
Modified
24 July 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 11.8th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-53838 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Google Android. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 11.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely identification, reporting, and correction of the out-of-bounds write vulnerability through patching as provided in the Android Pixel security bulletin.

prevent

Implements memory protection mechanisms such as address space layout randomization and data execution prevention to mitigate exploitation of the out-of-bounds write in VendorVideoAPI.

prevent

Enforces input validation and bounds checking for user data parsed by Exynos_parsing_user_data_registered_itu_t_t35 to prevent the incorrect bounds check leading to privilege escalation.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Out-of-bounds write enables local privilege escalation via arbitrary code execution on Android (maps directly to Exploitation for Privilege Escalation).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In Exynos_parsing_user_data_registered_itu_t_t35 of VendorVideoAPI.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Deeper analysisAI

CVE-2024-53838 involves an out-of-bounds write vulnerability stemming from an incorrect bounds check in the Exynos_parsing_user_data_registered_itu_t_t35 function of VendorVideoAPI.cpp. This flaw affects Android devices, as detailed in the Pixel security bulletin, and is classified under CWE-787 with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

A local attacker with low privileges, such as a standard user or app, can exploit this vulnerability to escalate privileges without needing additional execution privileges or user interaction. The low attack complexity enables arbitrary code execution or system compromise, leading to high impacts on confidentiality, integrity, and availability.

The Android Pixel security bulletin dated 2024-12-01, available at https://source.android.com/security/bulletin/pixel/2024-12-01, documents patches addressing this CVE for affected devices. Security practitioners should apply these updates promptly to mitigate the risk.

Details

CWE(s)

Affected Products

google
android
all versions

CVEs Like This One

CVE-2026-0010Same product: Google Android
CVE-2026-0123Same product: Google Android
CVE-2024-53837Same product: Google Android
CVE-2026-0124Same product: Google Android
CVE-2024-49745Same product: Google Android
CVE-2026-0117Same product: Google Android
CVE-2026-0037Same product: Google Android
CVE-2025-32313Same product: Google Android
CVE-2024-49738Same product: Google Android
CVE-2024-53833Same product: Google Android

References