Cyber Security News

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under limited, targeted exploitation.

These flaws, impacting Android versions 12 through 15, underscore escalating risks for billions of devices.

The bulletin mandates the immediate installation of the 2025-03-05 security patch, which resolves remote code execution and privilege escalation threats.

Critical System Vulnerability: CVE-2024-43093

The most severe flaw, CVE-2024-43093, resides in Android’s System component and permits remote code execution (RCE) without requiring additional user privileges.

Attackers exploiting this vulnerability could seize full device control, exfiltrate sensitive data, or deploy malware silently. Rated “Critical” due to its low complexity and high impact, the flaw affects Android 12, 12L, 13, 14, and 15.

Google’s internal tracking ID A-341680936 links to patches released to the Android Open Source Project (AOSP), though exploit attempts have already bypassed initial mitigations.

Devices unpatched beyond March 5, 2025, remain acutely vulnerable, particularly those with delayed OEM updates.

Privilege Escalation Flaw: CVE-2024-50302

CVE-2024-50302, tracked as A-380395346, enables local escalation of privileges (EoP) within the Android framework.

This high-severity vulnerability allows attackers with physical access—or those leveraging malware—to gain root privileges, bypassing sandbox protections.

The flaw stems from improper access controls in upstream Linux kernel subsystems (HID), impacting devices running Android 10 and later.

Google emphasizes that while exploitation requires user interaction, social engineering tactics (e.g., phishing links or rogue apps) could trigger the flaw.

Partners received patches a month before public disclosure, but delays in manufacturer rollout cycles leave many devices exposed.

Mitigations and Protections

Google’s blog post highlights layered defenses:

  1. Google Play Protect, enabled by default on 2.5 billion devices, now blocks apps attempting to exploit these CVEs.
  2. Android 15’s enhanced sandboxing restricts lateral movement post-exploitation.
  3. March 2025 patches address all vulnerabilities in AOSP and kernel subsystems.

Despite these measures, users are urged to:

  • Check for updates: Navigate to Settings > Security > Security Updates.
  • Avoid sideloading apps: Unverified APKs risk introducing exploit code.
  • Enable Google Play Protect: Activate via Google Play Store > Settings.

Major OEMs like Samsung and Google Pixel have already deployed patches, but budget and older devices face prolonged vulnerability windows.

Cybersecurity firm Kaspersky reports a 300% spike in Android-focused attacks since January 2025, with CVE-2024-43093 linked to state-aligned hacking groups.

Google recommends enterprises enforce strict patch policies and network segmentation for unpatched devices. For developers, auditing apps for unintended privilege access remains critical.

The Android team continues monitoring exploitation via Threat Analysis Group (TAG) and urges users to “prioritize updates as their first line of defense”.

With zero-day exploits proliferating, the March 2025 bulletin marks a pivotal moment for mobile security—one demanding swift, global action.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows privilege…

13 minutes ago

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems to…

3 hours ago

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to achieve…

5 hours ago

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass authentication…

5 hours ago

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring solution…

5 hours ago

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March 3,…

6 hours ago