Google Patches Two Critical Android Zero-Day Vulnerabilities Targeted by Hackers

Google Patches Two Critical Android Zero-Day Vulnerabilities Targeted by Hackers

On Monday, Google announced an important Android update aimed at addressing two critical zero-day vulnerabilities, which have potentially been exploited by hackers. This update is crucial for ensuring the security and integrity of Android devices worldwide.

Understanding the Android Zero-Day Vulnerabilities

These two zero-day vulnerabilities, identified as CVE-2024-53197 and CVE-2024-53150, were acknowledged by Google as being under “limited, targeted exploitation.” This indicates that hackers may have been actively using these flaws to compromise Android devices.

Details on CVE-2024-53197

The first vulnerability, CVE-2024-53197, was discovered by Amnesty International in collaboration with Benoît Sevens from Google’s Threat Analysis Group. This group specializes in tracking cyber threats from government-backed entities.

In February, Amnesty International revealed that Cellebrite, a company known for providing law enforcement with tools for phone unlocking and forensic analysis, had exploited a series of three zero-day vulnerabilities to gain unauthorized access to Android devices.

Impact on Activists

Amnesty’s findings highlighted the use of these vulnerabilities against a Serbian student activist, who was targeted by local authorities using Cellebrite’s technology.

Insights on CVE-2024-53150

While specific details about the second vulnerability, CVE-2024-53150, are sparse, it is confirmed that this flaw was also identified by Google’s Sevens and resides within the Android kernel, which is the core component of the operating system.

Google’s Response and Recommendations

In its advisory, Google emphasized that the most critical of these vulnerabilities poses a significant risk. It noted that this security flaw in the System component could facilitate remote privilege escalation without requiring user interaction or additional execution privileges.

Google has stated that it will release source code patches for these vulnerabilities within 48 hours of this advisory. Furthermore, Android partners are informed of such issues at least a month prior to public disclosure, ensuring timely updates.

READ ALSO  North Korea Linked to $1.4 Billion Bybit Crypto Heist: Researchers Uncover Shocking Allegations

Importance of Timely Updates

Given the open-source nature of Android, it is essential for every phone manufacturer to implement these patches promptly for their users. Regular updates are critical in maintaining device security and protecting against potential cyber threats.

If you have more information about Android zero-day vulnerabilities, please reach out securely to Lorenzo Franceschi-Bicchierai via Signal at +1 917 257 1382, or contact via Telegram and Keybase @lorenzofb, or by email. You can also contact TechCrunch via SecureDrop.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *