Wednesday, April 24, 2024

Android Security Update – Code Execution Flaw Let Hackers Control Your Android Device Remotely – Update Now

Android security bulletin published new security updates with the fixes for critical vulnerabilities that affected Android devices.

Patched vulnerabilities Include 2 remote code execution vulnerabilities let hackers execute the code remotely to control the vulnerable Android devices, also these  two critical vulnerabilities impact all Android 7.0 or later devices.

Google patched totally 11 vulnerabilities that include, two remote code execution vulnerability affected the media framework under “critical” severity and 9 “high” severity vulnerabilities that exist in system and Framework.

CVE-2019-2027 and CVE-2019-2028, Two remote code execution vulnerabilities enable a remote attacker to execute arbitrary code using a specially crafted file within the context of a privileged process.

CVE-2019-2026, A high severity vulnerability affected Android Framework let the local attacker gain additional permissions bypass with user interaction.

Remaining 8 other system level high severity vulnerabilities, enable a local malicious application to execute arbitrary code within the context of a privileged process.

Remaining 8 other system level high severity vulnerabilities, enable a local malicious application to execute arbitrary code within the context of a privileged process.

Android Security Update

Media Framework

CVEReferencesTypeSeverityUpdated AOSP versions
CVE-2019-2027A-119120561RCECritical7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2019-2028A-120644655RCECritical7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9


CVEReferencesTypeSeverityUpdated AOSP versions


CVEReferencesTypeSeverityUpdated AOSP versions
CVE-2019-2031A-120502559EoPHigh7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2019-2034A-122035770EoPHigh7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2019-2035A-122320256EoPHigh7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2019-2038A-121259048IDHigh7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2019-2039A-121260197IDHigh7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9

All the Android users are requested to update your phone immediately to apply the latest Android security patch.

To learn how to check a device’s security patch level, see Check and update your Android version.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Most Important Android Penetration Testing Tools for Hackers & Security Professionals


Latest articles

Researchers Uncover that UK.GOV Websites Sending Data to Chinese Ad Vendor Analysts

Analysts from Silent Push, a data analytics firm, have uncovered several UK government websites...

Ransomware Victims Who Opt To Pay Ransom Hits Record Low

Law enforcement operations disrupted BlackCat and LockBit RaaS operations, including sanctions on LockBit members...

IBM Nearing Talks to Acquire Cloud-software Provider HashiCorp

IBM is reportedly close to finalizing negotiations to acquire HashiCorp, a prominent cloud infrastructure...

Rewards Up to $10 Million for Information on Iranian Hackers

The United States Justice Department has announced big rewards for information leading to the...

PoC Exploit Released For Critical Oracle VirtualBox Vulnerability

Oracle Virtualbox was identified and reported as having a critical vulnerability associated with Privilege...

Tracing the Steps of Cyber Intruders: The Path of Lateral Movement

When cyber attacks strike, it's rarely a single computer that suffers. Nowadays, cybercriminals set...

U.S. to Impose Visa Restrictions on 13 Individuals Involved in Commercial Spyware Operations

To combat the misuse of commercial spyware, the United States Department of State has...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.


Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles