Google released an Android security update that addresses 43 flaws, including a critical remote code execution vulnerability in the Android System component tracked as CVE-2021-0316. Google addressed the flaws with the release of Security patch levels of 2021-01-05 or later.
“The most severe of these issues is a critical security vulnerability in the System component that could enable a remote attacker using a specially crafted transmission to execute arbitrary code within the context of a privileged process.” reads Google’s January Android security bulletin.
The bulletin also fixed a critical DoS vulnerability, tracked as CVE-2021-0313, that affects the Framework. The flaw could be exploited by a remote attacker using a specially crafted transmission to execute arbitrary code within the context of a privileged process.
The above vulnerabilities affect Android versions 8.0, 8.1, 9, 10 and 11.
Source code patches for these vulnerabilities have been released to the Android Open Source Project (AOSP) repository.
Google also addressed other 2 critical flaws in the Qualcomm closed-source components tracked as CVE-2020-11134 and CVE-2020-11182.
Google also fixed the following high-severity vulnerabilities:
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Google)
[adrotate banner=”5″]
[adrotate banner=”13″]
ZeroDayRAT is a commercial mobile spyware that grants full remote access to Android and iOS…
Senegal closed its national ID card office after a ransomware cyberattack disrupted ID, passport, and…
Dutch agencies confirmed attacks exploiting Ivanti EPMM flaws that exposed employee contact data at the…
China-linked group UNC3886 targeted Singapore ’s telecom sector in a cyber espionage campaign, Singapore’s Cyber…
Fortinet warns of a critical FortiClientEMS vulnerability that lets remote attackers run malicious code without…
BeyondTrust patched a critical pre-auth flaw in Remote Support and PRA that could let attackers…
This website uses cookies.