{"id":24295,"date":"2024-04-15T18:44:56","date_gmt":"2024-04-16T02:44:56","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/04\/15\/news-18025\/"},"modified":"2024-04-15T18:44:56","modified_gmt":"2024-04-16T02:44:56","slug":"news-18025","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/04\/15\/news-18025\/","title":{"rendered":"Google patches critical vulnerability for Androids with Qualcomm chips"},"content":{"rendered":"\n<p>In <a href=\"https:\/\/source.android.com\/docs\/security\/bulletin\/2024-04-01\">April\u2019s update for the Android operating system (OS)<\/a>, Google has patched 28 vulnerabilities, one of which is rated critical for Android devices equipped with <a href=\"https:\/\/docs.qualcomm.com\/product\/publicresources\/securitybulletin\/march-2024-bulletin.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Qualcomm<\/a> chips.<\/p>\n<p>You can find your device\u2019s Android version number, security update level, and Google Play system level in your Settings app. You\u2019ll get notifications when updates are available for you, but you can also check for updates.<\/p>\n<p>If your Android phone is at patch level 2024-04-05 or later then the issues discussed below have been fixed. The updates have been made available for Android 12, 12L and 13. Android partners are notified of all issues at least a month before publication, however, this <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/11\/android-users-are-facing-a-double-patch-gap\">doesn\u2019t always mean<\/a> that the patches are available for devices from all vendors.<\/p>\n<p>For most phones it works like this: Under&nbsp;<strong>About phone<\/strong>&nbsp;or&nbsp;<strong>About device<\/strong>&nbsp;you can tap on&nbsp;<strong>Software updates<\/strong>&nbsp;to check if there are new updates available for your device, although there may be slight differences based on the brand, type, and Android version of your device.<\/p>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The Qualcomm CVE is listed as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-28582\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2023-28582<\/a>. It has a <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2020\/05\/how-cvss-works-characterizing-and-scoring-vulnerabilities\">CVSS score<\/a> of 9.8 out of 20 and is described as a memory corruption in Data Modem while verifying hello-verify message during the Datagram Transport Layer Security (DTLS) handshake.<\/p>\n<p>The cause of the memory corruption lies in a buffer copy without checking the size of the input. Practically, this means that a remote attacker can cause a buffer overflow during the verification of a DTLS handshake, allowing them to execute code on the affected device.<\/p>\n<p>Another vulnerability highlighted by Google is <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-23704\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-23704<\/a>, an elevation of privilege (EoP) vulnerability in the System component that affects Android 13 and Android 14.<\/p>\n<p>This vulnerability could lead to local escalation of privilege with no additional execution privileges needed. Local privilege escalation happens when one user acquires the system rights of another user. This could allow an attacker to access information they shouldn\u2019t have access to, or perform actions at a higher level of permissions.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-pixel-users\">Pixel users<\/h3>\n<p><a href=\"https:\/\/source.android.com\/docs\/security\/bulletin\/pixel\/2024-04-01\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google warns Pixel users<\/a> that there are indications that two high severity vulnerabilities may be under limited, targeted exploitation. These vulnerabilities are:<\/p>\n<ul>\n<li><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-29745\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-29745<\/a>: An information disclosure vulnerability in the bootloader component. Bootloaders are one of the first programs to load and ensure that all relevant operating system data is loaded into the main memory when a device is started.<\/li>\n<li><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-29748\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-29748<\/a>: An elevation of privilege (EoP) vulnerability in the Pixel firmware. Firmware is device-specific software that provides basic machine instructions that allow the hardware to function and communicate with other software running on the device.<\/li>\n<\/ul>\n<p>On Pixel devices, a security patch level of 2024-04-05 resolves all these security vulnerabilities.<\/p>\n<hr class=\"wp-block-separator alignfull has-alpha-channel-opacity is-style-wide\" \/>\n<p><strong>We don\u2019t just report on phone security\u2014we provide it<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices by\u00a0<a href=\"https:\/\/www.malwarebytes.com\/ios\">downloading Malwarebytes for iOS<\/a>, and <a href=\"https:\/\/www.malwarebytes.com\/android\">Malwarebytes for Android<\/a> today.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/04\/google-patches-critical-vulnerability-for-androids-with-qualcomm-chips\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Google has issued patches for 28 security vulnerabilities, including a critical patch for Androids with Qualcomm chips. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10462,1670,32],"class_list":["post-24295","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-android","tag-google","tag-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24295"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24295\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24295"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}