{"id":23543,"date":"2023-12-07T05:10:12","date_gmt":"2023-12-07T13:10:12","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/12\/07\/news-17273\/"},"modified":"2023-12-07T05:10:12","modified_gmt":"2023-12-07T13:10:12","slug":"news-17273","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/12\/07\/news-17273\/","title":{"rendered":"Android phones can be taken over remotely &#8211; update when you can"},"content":{"rendered":"\n<p>Android phones are vulnerable to attacks that could allow someone to takeover a device remotely without the device owner needing to do anything.<\/p>\n<p>Updates for these vulnerabilities and more are included in Google&#8217;s <a href=\"https:\/\/source.android.com\/docs\/security\/bulletin\/2023-12-01\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Android security bulletin for December<\/a>. In total, there are patches for 94 vulnerabilities, including five rated as \u201cCritical.\u201d<\/p>\n<p>The most severe of these flaws is a vulnerability in the System component that could lead to remote code execution (RCE) without any additional execution privileges required. User interaction is not needed for exploitation.<\/p>\n<p>This vulnerability, referenced as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-40088\">CVE-2023-40088<\/a>, affects a function that is used for Bluetooth communication, so the \u201cremote\u201d part is limited to \u201cclose range\u201d since the average Bluetooth range is about 30 feet (10 meters). Successful manipulation with a specially crafted input leads to a use after free vulnerability. Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.<\/p>\n<p>Another critical vulnerability (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-40477\">CVE-2023-40077<\/a>) that looks problematic is an Elevation of Privilege (EoP) vulnerability in the Android Framework. Successful exploitation could lead to a race condition. A race condition, or race hazard, is the behavior of a system where the output depends on the sequence or timing of other uncontrollable events. It becomes a bug when events do not happen in the order the programmer intended. In this case it could provide a successful attacker with permissions to perform actions they shouldn\u2019t be able to.<\/p>\n<p>Security patch levels of 2023-12-05 or later address all of these issues. To learn how to check a device&#8217;s security patch level, see how to\u00a0<a href=\"https:\/\/support.google.com\/android\/answer\/7680439?hl=en\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">check and update your Android version<\/a>. The updates have been made available for Android 11, 12, 12L, 13, and 14. Android partners are notified of all issues at least a month before publication, however,\u00a0<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/11\/android-users-are-facing-a-double-patch-gap\">this doesn\u2019t always mean that the patches are available for devices from all vendors<\/a>. Android vendors such as Samsung and OnePlus have pledged to release security updates once a month. Google usually ships out security updates to Pixel phones within two weeks or sooner.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on vulnerabilities\u2014we identify them, and prioritize action.<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using\u00a0<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">ThreatDown Vulnerability and Patch Management<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/12\/android-phones-can-be-taken-over-remotely-update-when-you-can\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Android phones are vulnerable to attacks that allow a remote execution of malicious code and it requires no user interaction. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10462,22783,32],"class_list":["post-23543","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-android","tag-exploits-and-vulnerabilities","tag-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23543"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23543\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23543"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}