Google's March 2025 Android Security Bulletin has highlighted two severe vulnerabilities—CVE-2024-43093 and CVE-2024-50302—that are currently being targeted in limited attacks. These flaws, affecting Android versions 12 through 15, represent significant security risks for billions of users. The bulletin stresses the urgency of installing the March 5, 2025, security patch, which addresses critical remote code execution (RCE) and privilege escalation issues. The more severe vulnerability, CVE-2024-43093, is found in Android’s System component and allows remote code execution without requiring extra user privileges. Exploiting this flaw could give attackers full control of a device, enabling them to steal sensitive data or install malware. This vulnerability, which affects Android 12 through 15, is deemed "Critical" due to its high impact and ease of exploitation. Although patches have been released to the Android Open Source Project (AOSP), earlier mitigations have been bypassed, making unpatched devices especially vulnerable. CVE-2024-50302 is a local privilege escalation issue within the Android framework. It allows attackers with physical access or those using malware to gain root access, bypassing security restrictions. This flaw affects devices running Android 10 or later and originates from improper access controls in Linux kernel subsystems. While exploitation requires user interaction, social engineering techniques, like phishing, could be used to trigger the vulnerability. Google has already shared patches with partners, but delays in OEM rollouts leave many devices exposed. The March 2025 patch addresses these vulnerabilities, but Google urges users to stay vigilant. They recommend regularly checking for security updates, avoiding unverified apps, and enabling Google Play Protect. Despite these protections, many devices—especially older or budget models—remain at risk, underscoring the need for timely updates. With a sharp increase in Android-related attacks in 2025, the Android team emphasizes that users should prioritize updates as their primary defense against potential exploits.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...