{"id":25030,"date":"2024-08-06T06:10:10","date_gmt":"2024-08-06T14:10:10","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/08\/06\/news-18760\/"},"modified":"2024-08-06T06:10:10","modified_gmt":"2024-08-06T14:10:10","slug":"news-18760","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/08\/06\/news-18760\/","title":{"rendered":"Android vulnerability used in targeted attacks patched by Google"},"content":{"rendered":"\n<p>Google <a href=\"https:\/\/source.android.com\/docs\/security\/bulletin\/2024-08-01\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">has released patches<\/a> for 46 vulnerabilities in Android, including a <a href=\"https:\/\/www.malwarebytes.com\/glossary\/remote-code-execution-rce-attack\">remote code execution (RCE)<\/a> vulnerability that it says has been used in limited, targeted attacks.<\/p>\n<p>You can find your device\u2019s Android version number, security update level, and Google Play system level in your Settings app. You\u2019ll get notifications when updates are available for you, but you can also check for updates.<\/p>\n<p>If your Android phone is at patch level 2024-08-01 or later then the issues discussed below have been fixed. The updates have been made available for Android 12, 12L, 13, and 14. Android partners, such as Samsung, Sony, etc, are notified of all issues at least a month before publication, however, this\u00a0<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/11\/android-users-are-facing-a-double-patch-gap\">doesn\u2019t always mean<\/a>\u00a0that the patches are available for devices from all vendors.<\/p>\n<p>For most Android devices, you can check for new updates like this: Under\u00a0<strong>About phone<\/strong>\u00a0or\u00a0<strong>About device<\/strong>\u00a0you can tap on\u00a0<strong>Software updates<\/strong>, although there may be slight differences based on the brand, type, and Android version.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-technical-details\">Technical details<\/h2>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The actively exploited vulnerability is listed as:<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-36971\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-36971<\/a> is a use after free (UAF) vulnerability in the Linux kernel. The vulnerability could lead to remote code execution with System execution privileges needed.<\/p>\n<p>This Linux kernel vulnerability affects the Android OS because the Android kernel is based on an upstream Linux Long Term Supported (LTS) kernel. This kernel is like the engine of the operating system, managing the hardware and basic functions.<\/p>\n<p>The Android kernel is based on a version of the Linux kernel, which is a popular core for many operating systems. Specifically, Android uses a version of the Linux kernel that is designated as &#8220;Long Term Supported&#8221; (LTS). This means it&#8217;s a version that gets updates and fixes for a longer period than regular versions, ensuring it stays secure and stable over time.<\/p>\n<p>UAF is a type of vulnerability that happens when a program incorrectly handles its memory. When a program frees up a piece of memory but still tries to use it afterward, an attacker can exploit this mistake. This can cause the program to crash, behave unpredictably, or even run harmful code. In this case it allows the attacker to remotely execute code on the device if they have enough privileges.<\/p>\n<p>Attackers would need to gain the needed privileges to use this vulnerability by combining it with other vulnerabilities.<\/p>\n<hr class=\"wp-block-separator alignfull has-alpha-channel-opacity is-style-wide\" \/>\n<p><strong>We don\u2019t just report on phone security\u2014we provide it<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices by\u00a0<a href=\"https:\/\/www.malwarebytes.com\/ios\">downloading Malwarebytes for iOS<\/a>, and <a href=\"https:\/\/www.malwarebytes.com\/android\">Malwarebytes for Android<\/a> today.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/08\/android-vulnerability-used-in-targeted-attacks-patched-by-google\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Google has issued security updates for 46 vulnerabilities, including a patch for a remote code execution flaw which has been used in limited targeted attacks. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[31756,10462,31757,32],"class_list":["post-25030","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-2024-08-01","tag-android","tag-cve-2024-36971","tag-news"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25030"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25030\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}