CVE-2024-56192
Published: 10 March 2025
Summary
CVE-2024-56192 is a high-severity Improper Preservation of Permissions (CWE-281) vulnerability in Google Android. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 7.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the out-of-bounds write vulnerability through timely application of vendor patches specified in the Android security bulletin for Pixel Watch.
Implements memory protections like ASLR and non-executable pages that mitigate exploitation of out-of-bounds writes in wl_notify_gscan_event even prior to patching.
Enforces validation and bounds checking on inputs processed by wl_notify_gscan_event to prevent the missing bounds check from causing out-of-bounds writes.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Out-of-bounds write in wl_notify_gscan_event enables local privilege escalation from low-privileged context with no user interaction.
NVD Description
In wl_notify_gscan_event of wl_cfgscan.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Deeper analysisAI
CVE-2024-56192 is a vulnerability involving an out-of-bounds write due to a missing bounds check in the wl_notify_gscan_event function of wl_cfgscan.c. This flaw affects the Pixel Watch, as documented in the associated Android security bulletin.
A local attacker with low privileges (PR:L) can exploit this vulnerability with low attack complexity (AC:L) and no user interaction required (UI:N). Exploitation enables local escalation of privilege, potentially compromising high levels of confidentiality, integrity, and availability (C:H/I:H/A:H), as reflected in its CVSS v3.1 base score of 7.8.
The Android security bulletin for Pixel Watch, dated 2025-03-01 and available at https://source.android.com/docs/security/bulletin/pixel-watch/2025/2025-03-01, provides details on patches to mitigate this issue. Security practitioners should ensure affected devices receive these updates to prevent exploitation.
Details
- CWE(s)