Saturday, December 14, 2024
HomeAndroidAndroid Security Updates: 2023 - 37 Vulnerabilities Patched Including RCE, DOS

Android Security Updates: 2023 – 37 Vulnerabilities Patched Including RCE, DOS

Published on

SIEM as a Service

Android has fixed 37 vulnerabilities that were impacting its devices with the release of its November 2023 security updates. Most of the flaws included information disclosure, elevation of privilege, denial of service, and remote code execution.

These updates address major security flaws and offer important upgrades to safeguard user information security and Android devices’ overall functioning.

Vulnerability and Category

Android has examined every component and subcomponents to identify every possible vulnerability and apply the necessary patches. 

- Advertisement - SIEM as a Service

These vulnerabilities impacted the Framework, Media Framework, System, and components, including the kernel and processor-based components. 

Almost 15 vulnerabilities related to Android’s Framework and System components were fixed. One of the main vulnerabilities patched in this release is a ‘critical’ security issue in the System component that might expose local information without requiring additional execution privileges.

 “The most severe of these issues is critical security vulnerability in the System component that could lead to local information disclosure with no additional execution privileges needed,” Google said.

This critical flaw, identified as CVE-2023-40113, has been fixed together with six additional issues in the System component that impacts various Android versions.

The remaining 14 vulnerabilities are ‘high-severity’ vulnerabilities addressed in this update, which includes information disclosure, denial-of-service attacks, and privilege escalation. 

The November 2023 security update for Android also fixes 22 security flaws in components, including Qualcomm, MediaTek, and Arm.

The Arm component had one ‘High’ severity issue tracked as CVE-2023-28469. 

MediaTek components have six ‘High’ severity issues, which include CVE-2023-32832, CVE-2023-32834, CVE-2023-32835, CVE-2023-32836, CVE-2023-32837, and CVE-2023-20702.

Qualcomm components include fixes for four high-severity vulnerabilities: CVE-2023-33031, CVE-2023-33055, CVE-2023-33059, and CVE-2023-33074.

Qualcomm closed-source components include fixes four critical vulnerabilities: CVE-2023-21671, CVE-2023-22388, CVE-2023-28574 and CVE-2023-33045. The remaining seven vulnerabilities are classified as ‘high’ severity issues.

Google has also published kernel version updates for Android 11 to 13, ensuring the most recent security fixes are implemented in the underlying operating system.

For detailed information on the vulnerabilities and patches, refer to the security bulletin released by Android.

Patch Manager Plus: Automatically Patch over 850 third-party applications quickly – Try Free Trial.

Also Read:

Android Application Penetration Testing

Threat Actors Abuse Google Groups To Send Fake Order Notifications

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Nigerian National Extradited to Nebraska for Wire Fraud Charges

United States Attorney Susan Lehr announced the extradition of Abiola Kayode, 37, from Nigeria...

Dell Security Update, Patch for Multiple Critical Vulnerabilities

Dell Technologies has released a security advisory addressing multiple critical vulnerabilities that could expose...

CISA Issues 10 New Advisories on Industrial Control System Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten critical advisories, highlighting vulnerabilities...

FBI Seizes Rydox Marketplace, Arrests Key Administrators

The Federal Bureau of Investigation (FBI) announced the seizure of Rydox, an illicit online...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Dell Security Update, Patch for Multiple Critical Vulnerabilities

Dell Technologies has released a security advisory addressing multiple critical vulnerabilities that could expose...

Antidot Malware Attacking Employees Android Devices To Inject Malicious Payloads

Researchers discovered a new variant of the AntiDot banking trojan targeting Android mobile devices...

New Chinese Surveillance Tool Attack Android Users Since 2017

Wuhan Chinasoft Token Information Technology Co., Ltd. developed EagleMsgSpy, a surveillance tool operational since...