Friday, February 28, 2025
HomeSecurity NewsGoogle Security Update Released for Android with Fixed KRACK Attacks Vulnerability

Google Security Update Released for Android with Fixed KRACK Attacks Vulnerability

Published on

SIEM as a Service

Follow Us on Google News

Google Security Update Released for Android with many critical vulnerability fixes along with Recent WiFi based Very Critical KRACK Attacks vulnerability for all the Android Version under the 2017-11-06 security patch level.

A week before new Tool called KRACK Detector has been released to prevent from this critical KRACK Attack Vulnerability.

This Patch levels has split up into 3 parts that is categorized  2017-11-01 and 2017-11-05 patch levels at least a month before publication and last month notified all the issues has been allocated to 2017-11-06 patch level.

Media Framework based Vulnerability has considered as a severe one that could enable a remote attacker using a specially crafted file to execute arbitrary code.

According to Android Security Bulletin, Security patches for the KRACK vulnerabilities are provided under the 2017-11-06 security patch level.

Google Also Launched new Pixel / Nexus Security Bulletin where security vulnerabilities will be released for Pixel and Nexus devices .

Also Read :  Apple Released Security Update for iOS 11.1 & Other Apple Products with a KRACK Attack Fix

2017-11-01 Category  security patch level

Framework

This Framework based vulnerability  bypass the local malicious application and it could be possible by the way of user interaction to the target for successfully gain the access.

Media framework

Media Framework contains some severe flow with many Remote code execution vulnerability that could enable to a remote attacker using a specially crafted file to execute arbitrary code.

2017-11-05 Category  security patch level

In this category Maximum valnerabilities has been Discovered under local malicious application to execute arbitrary code within the context of a privileged process.

Vulnerability Pateched under following catogory compnents.

  • Kernel components
  • MediaTek components
  • NVIDIA components
  • Qualcomm components

2017-11-06 Category security patch level

Accrording to Security Bulletin Report, The most severe vulnerability in this section could enable a proximate attacker to bypass user interaction requirements before joining an unsecured Wi-Fi network.

Device manufacturers that include these updates should set the patch string level to:

  • [ro.build.version.security_patch]:[2017-11-01]
  • [ro.build.version.security_patch]:[2017-11-05]
  • [ro.build.version.security_patch]:[2017-11-06]

Android device and chipset manufacturers are encouraged to document the presence of other fixes on their devices through their own security websites, such as the Samsung, LGE, or Pixel / Nexus security bulletins , Google Said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...