Google has fixed a critical security flaw in Android 12 with its February 2022 Android security update.
The vulnerability, code-named CVE-2021-39675, affected the Procedure component and could allow hackers to get admin privileges remotely.
Google’s Android Security Bulletin also addresses a second critical vulnerability, CVE-2021-30317, which affects a shut-supply component constructed by Qualcomm and was lively on all Android devices equipped with the hardware.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
Hence far, there have been no reviews of lively exploitation of both of the now-patched vulnerabilities.
Apart from CVE-2021-39675 and CVE-2021-30317 vulnerabilities, Google issued fixes for five high-severity flaws in Framework, 4 superior-severity bugs in Media Framework, seven substantial-severity to critical flaws in System, two vulnerabilities of unfamiliar severity in Media Service provider, a single superior-severity flaw in Amlogic components, 5 higher-severity bugs in MediaTek components, a few high-severity flaws in Unisoc components, and six high to critical severity vulnerabilities in Qualcomm parts.
“The severity assessment of bugs is centered on the impact that exploiting the vulnerability would quite possibly have on an impacted system, assuming the system and services mitigations are turned off for improvement uses or if efficiently bypassed,” spelled out Google.
Having said that, the look for giant noted that the severity of vulnerabilities impacting Amlogic, MediaTek, Unisoc, and Qualcomm components are identified by the resource seller.
Google Enjoy method updates and security updates are accessible for Android equipment managing Android 10 and afterwards.
Some pieces of this short article are sourced from:
www.itpro.co.uk