Android Security Updates: 2023 – 37 Vulnerabilities Patched Including RCE, DOS

Android has fixed 37 vulnerabilities that were impacting its devices with the release of its November 2023 security updates. Most of the flaws included information disclosure, elevation of privilege, denial of service, and remote code execution.

These updates address major security flaws and offer important upgrades to safeguard user information security and Android devices’ overall functioning.

Vulnerability and Category

Android has examined every component and subcomponents to identify every possible vulnerability and apply the necessary patches. 

These vulnerabilities impacted the Framework, Media Framework, System, and components, including the kernel and processor-based components. 

Almost 15 vulnerabilities related to Android’s Framework and System components were fixed. One of the main vulnerabilities patched in this release is a ‘critical’ security issue in the System component that might expose local information without requiring additional execution privileges.

 “The most severe of these issues is critical security vulnerability in the System component that could lead to local information disclosure with no additional execution privileges needed,” Google said.

This critical flaw, identified as CVE-2023-40113, has been fixed together with six additional issues in the System component that impacts various Android versions.

The remaining 14 vulnerabilities are ‘high-severity’ vulnerabilities addressed in this update, which includes information disclosure, denial-of-service attacks, and privilege escalation. 

The November 2023 security update for Android also fixes 22 security flaws in components, including Qualcomm, MediaTek, and Arm.

The Arm component had one ‘High’ severity issue tracked as CVE-2023-28469. 

MediaTek components have six ‘High’ severity issues, which include CVE-2023-32832, CVE-2023-32834, CVE-2023-32835, CVE-2023-32836, CVE-2023-32837, and CVE-2023-20702.

Qualcomm components include fixes for four high-severity vulnerabilities: CVE-2023-33031, CVE-2023-33055, CVE-2023-33059, and CVE-2023-33074.

Qualcomm closed-source components include fixes four critical vulnerabilities: CVE-2023-21671, CVE-2023-22388, CVE-2023-28574 and CVE-2023-33045. The remaining seven vulnerabilities are classified as ‘high’ severity issues.

Google has also published kernel version updates for Android 11 to 13, ensuring the most recent security fixes are implemented in the underlying operating system.

For detailed information on the vulnerabilities and patches, refer to the security bulletin released by Android.

Patch Manager Plus: Automatically Patch over 850 third-party applications quickly – Try Free Trial.

Also Read:

Android Application Penetration Testing

Threat Actors Abuse Google Groups To Send Fake Order Notifications

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance

Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces its…

8 hours ago

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券), a…

8 hours ago

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series of…

8 hours ago

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive ransomware,…

8 hours ago

Qilin Operators Imitate ScreenConnect Login Page to Deploy Ransomware and Gain Admin Access

In a recent cyberattack attributed to the Qilin ransomware group, threat actors successfully compromised a…

9 hours ago

Operation HollowQuill Uses Malicious PDFs to Target Academic and Government Networks

A newly uncovered cyber-espionage campaign, dubbed Operation HollowQuill, has been identified as targeting academic, governmental,…

9 hours ago