{"id":25430,"date":"2024-11-06T06:10:06","date_gmt":"2024-11-06T14:10:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/11\/06\/news-19160\/"},"modified":"2024-11-06T06:10:06","modified_gmt":"2024-11-06T14:10:06","slug":"news-19160","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/11\/06\/news-19160\/","title":{"rendered":"Update your Android: Google patches two zero-day vulnerabilities"},"content":{"rendered":"\n<p>Google has announced patches for several high severity vulnerabilities. In total, 51 vulnerabilities have been patched in November&#8217;s updates, two of which are under limited, active exploitation by cybercriminals.<\/p>\n<p>If your Android phone shows patch level 2024-11-05 or later then the issues discussed below have been fixed. The updates have been made available for Android 12, 12L, 13, 14, and 15. Android vendors are notified of all issues at least a month before publication, however, this\u00a0<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/11\/android-users-are-facing-a-double-patch-gap\">doesn\u2019t always mean that the patches are available for all devices immediately<\/a>.<\/p>\n<p>You can find your device\u2019s Android version number, security update level, and Google Play system level in your Settings app. You\u2019ll get notifications when updates are available for you, but you can also check for them yourself.<\/p>\n<p>For most phones it works like this: Under\u00a0<strong>About phone<\/strong>\u00a0or\u00a0<strong>About device<\/strong>\u00a0you can tap on\u00a0<strong>Software updates<\/strong>\u00a0to check if there are new updates available for your device, although there may be slight differences based on the brand, type, and Android version of your device.<\/p>\n<p>Keeping your device as up to date as possible protects you from known vulnerabilities that have been fixed, and helps you to stay safe.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-technical-details\">Technical details<\/h2>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The CVEs that look the most important are:<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-43047\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-43047<\/a>: a high-severity use-after-free issue in closed-source Qualcomm components within the Android kernel that elevates privileges. Use after free (UAF) is a vulnerability due to incorrect use of dynamic memory during a program\u2019s operation. If after freeing a memory location a program does not clear the pointer to that memory, an attacker can use the error to manipulate the program. Qualcomm <a href=\"https:\/\/git.codelinaro.org\/clo\/la\/platform\/vendor\/qcom\/opensource\/dsp-kernel\/-\/commit\/0e27b6c7d2bd8d0453e4465ac2ca49a8f8c440e2\">disclosed<\/a> the vulnerability in October as a problem in its Digital Signal Processor (DSP) service. The vulnerability is flagged as under limited, targeted exploitation and could allow an attacker to escalate privileges on targeted devices.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-43093\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-43093<\/a>: a high-severity escalation of privilege vulnerability impacting the Android Framework and the Google Play system updates. This is the second vulnerability that is flagged as under limited, targeted exploitation.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-43091\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-43091<\/a>: a high severity Remote Code Execution (RCE). By exploiting this vulnerability in the System component an attacker could remotely execute code on a device with no additional execution privileges needed.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-38408\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-38408<\/a>: is the only vulnerability listed as critical in this update. The problem is described as a \u201ccryptographic issue when a controller receives an LMP start encryption command under unexpected conditions.\u201d LMP stands for Link Manager Protocol, which is a communication system used in Bluetooth technology to set up and manage connections between devices. The &#8220;start encryption command&#8221; is a special instruction that tells Bluetooth devices to begin scrambling their communications. The issue was patched by Qualcomm, which published a <a href=\"https:\/\/docs.qualcomm.com\/product\/publicresources\/securitybulletin\/november-2024-bulletin.html\">long list of affected chipsets<\/a>.<\/p>\n<hr class=\"wp-block-separator alignfull has-alpha-channel-opacity is-style-wide\" \/>\n<p><strong>We don\u2019t just report on phone security\u2014we provide it<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices by\u00a0<a href=\"https:\/\/www.malwarebytes.com\/ios\">downloading Malwarebytes for iOS<\/a>, and <a href=\"https:\/\/www.malwarebytes.com\/android\">Malwarebytes for Android<\/a> today.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/11\/update-your-android-google-patches-two-zero-day-vulnerabilities\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Google has released patches for two zero-days and a lot of other high level vulnerabilities. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[32111,10462,32112,32113,32114,32115,32,32116],"class_list":["post-25430","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-2024-11-05","tag-android","tag-cve-2024-38408","tag-cve-2024-43047","tag-cve-2024-43091","tag-cve-2024-43093","tag-news","tag-security-bulletin"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25430"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25430\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}