Saturday, May 18, 2024

Google Security Update Released for Android with Fixed KRACK Attacks Vulnerability

Google Security Update Released for Android with many critical vulnerability fixes along with Recent WiFi based Very Critical KRACK Attacks vulnerability for all the Android Version under the 2017-11-06 security patch level.

A week before new Tool called KRACK Detector has been released to prevent from this critical KRACK Attack Vulnerability.

This Patch levels has split up into 3 parts that is categorized  2017-11-01 and 2017-11-05 patch levels at least a month before publication and last month notified all the issues has been allocated to 2017-11-06 patch level.

Media Framework based Vulnerability has considered as a severe one that could enable a remote attacker using a specially crafted file to execute arbitrary code.

According to Android Security Bulletin, Security patches for the KRACK vulnerabilities are provided under the 2017-11-06 security patch level.

Google Also Launched new Pixel / Nexus Security Bulletin where security vulnerabilities will be released for Pixel and Nexus devices .

Also Read :  Apple Released Security Update for iOS 11.1 & Other Apple Products with a KRACK Attack Fix

2017-11-01 Category  security patch level


This Framework based vulnerability  bypass the local malicious application and it could be possible by the way of user interaction to the target for successfully gain the access.

Media framework

Media Framework contains some severe flow with many Remote code execution vulnerability that could enable to a remote attacker using a specially crafted file to execute arbitrary code.

2017-11-05 Category  security patch level

In this category Maximum valnerabilities has been Discovered under local malicious application to execute arbitrary code within the context of a privileged process.

Vulnerability Pateched under following catogory compnents.

  • Kernel components
  • MediaTek components
  • NVIDIA components
  • Qualcomm components

2017-11-06 Category security patch level

Accrording to Security Bulletin Report, The most severe vulnerability in this section could enable a proximate attacker to bypass user interaction requirements before joining an unsecured Wi-Fi network.

Device manufacturers that include these updates should set the patch string level to:

  • []:[2017-11-01]
  • []:[2017-11-05]
  • []:[2017-11-06]

Android device and chipset manufacturers are encouraged to document the presence of other fixes on their devices through their own security websites, such as the Samsung, LGE, or Pixel / Nexus security bulletins , Google Said.


Latest articles

Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks

A very important message from the Norwegian National Cyber Security Centre (NCSC) says that...

New Linux Backdoor Attacking Linux Users Via Installation Packages

Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices,...

ViperSoftX Malware Uses Deep Learning Model To Execute Commands

ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine,...

Santander Data Breach: Hackers Accessed Company Database

Santander has confirmed that there was a major data breach that affected its workers...

U.S. Govt Announces Rewards up to $5 Million for North Korean IT Workers

The U.S. government has offered a prize of up to $5 million for information...

Russian APT Hackers Attacking Critical Infrastructure

Russia leverages a mix of state-backed Advanced Persistent Threat (APT) groups and financially motivated...

Millions Of IoT Devices Vulnerable To Attacks Leads To Full Takeover

Researchers discovered four significant vulnerabilities in the ThroughTek Kalay Platform, which powers 100 million...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles