This month's Android security update addresses 46 vulnerabilities, including a high-severity remote code execution (RCE) flaw. The zero-day, tracked as CVE-2024-36971, is a use-after-free (UAF) issue in the Linux kernel's network route management. Exploiting this flaw requires system-level execution privileges and can alter network connections' behavior. Google indicates that this might be targeted in attacks to achieve arbitrary code execution on unpatched devices without user interaction. This vulnerability was discovered and reported by Clément Lecigne of Google's Threat Analysis Group (TAG). While Google has not yet provided details on the exploitation methods or involved threat actors, TAG often identifies zero-days used in state-sponsored surveillance. Source code patches for these vulnerabilities will be available in the Android Open Source Project (AOSP) repository within 48 hours. Earlier this year, Google also addressed another zero-day—a high-severity elevation of privilege (EoP) flaw in Pixel firmware, tracked as CVE-2024-32896 by Google and CVE-2024-29748 by GrapheneOS, which was exploited to unlock devices and access data. The August security updates include two patch sets: the 2024-08-01 and 2024-08-05 levels. The latter encompasses all fixes from the former plus additional patches for third-party and Kernel components, including CVE-2024-23350, a critical Qualcomm component vulnerability. Not all devices may need the updates from the 2024-08-05 patch level, as vendors might prioritize the initial update for a smoother deployment. Google Pixel devices receive updates immediately, but other manufacturers might take longer due to additional compatibility testing.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...