Google Patches Actively Exploited Android Kernel Zero-Day Patched

by Esmeralda McKenzie
Google Patches Actively Exploited Android Kernel Zero-Day Patched

Google Patches Actively Exploited Android Kernel Zero-Day Patched

Google Security Replace – Actively Exploited Android Kernel Zero-Day Patched

The Android Security Bulletin for August 2024 small print vulnerabilities addressed by the 2024-08-05 security patch level.

The most valuable yelp is a high-severity vulnerability within the Framework component, which might per chance perchance doubtlessly allow native privilege escalation without further execution privileges.

Android partners were notified a month before, and present code patches will possible be released to the Android Originate Provide Project (AOSP) repository interior forty eight hours.

Google Files

Researchers at Google patched the actively exploited Android Kernel zero-day of their most up-to-date security update, and this vulnerability modified into tracked as “CVE-2024-36971.”

This vulnerability is a utilize-after-free (UAF) security flaw. The bulletin highlights the role of Android security platform protections and Google Play Give protection to in mitigating these vulnerabilities, noting that severity assessments grunt these safeguards are disabled or bypassed.

Android Kernel Zero-Day Patched

The Linux kernel’s community route administration design has a severe utilize-after-free (UAF) vulnerability, which modified into tracked as “CVE-2024-36971.”

This flaw can enable attackers with design execution privileges to develop any code on unpatched devices without the involvement of customers.

Such code might per chance perchance exchange the device in which community connections are made. Google affirmed that there might per chance be proof that some experts had been exploiting this for arena of skills purposes; in consequence, it is better if customers attain no longer downplay its seriousness.

It additionally threatens design integrity and community security as it’ll also lead to stealthy attacks and in consequence demands elevated privileges for exploitation.

Google’s TAG security researcher, Clement Lecigne, chanced on and reported this distinguished security flaw.

While TAG has but to level to the actual ways employed or the culprits within the wait on of it, the disclosure is harmonious with its actual efforts to unveil the zero-day threats.

These kinds of vulnerabilities are frequently ragged in raids by grunt-controlled spying programs, which on the total focal level on renowned personalities admire political leaders, human rights campaigners, or even files journalists.

TAG’s work exposes these risks and shields the secure security of vulnerable design customers globally.

Google issued two Android security patch units for August 2024:-

  • 2024-08-01
  • 2024-08-05

The latter contains all fixes, plus further patches for third-event closed-offer and Kernel parts, including a distinguished Qualcomm vulnerability.

While Google Pixel devices receive rapid updates, other manufacturers might per chance perchance lengthen the rollout to behavior compatibility discovering out all the device in which by diverse hardware configurations.

This lengthen, on the opposite hand, doesn’t basically elevate the exploitation risks. Apart from this, no longer all devices require the tubby 2024-08-05 patch level, allowing vendors to prioritize the preliminary patch for streamlined updates.

Mitigations

Here below, now we maintain talked about your complete mitigations:-

  • Replace to the most up-to-date Android version to make stronger security.
  • Depend on Google Play Give protection to for monitoring and warnings against injurious apps.
  • Construct obvious Google Play Give protection to is enabled, especially if inserting in apps from exterior Google Play.

Source credit : cybersecuritynews.com

Related Posts