• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Zero-Day Alert: Latest Android Patch Update Includes Fix for Newly Actively Exploited Flaw

You are here: Home / General Cyber Security News / Zero-Day Alert: Latest Android Patch Update Includes Fix for Newly Actively Exploited Flaw
September 6, 2023

Android Patch Update

Google has rolled out month-to-month security patches for Android to tackle a range of flaws, including a zero-day bug that it said may have been exploited in the wild.

Tracked as CVE-2023-35674, the superior-severity vulnerability is described as a situation of privilege escalation impacting the Android Framework.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“There are indications that CVE-2023-35674 might be below restricted, targeted exploitation,” the firm explained in its Android Security Bulletin for September 2023 without the need of delving into supplemental specifics.

The update also addresses 3 other privilege escalation flaws in Framework, with the search big noting that the most intense of these issues “could lead to community escalation of privilege with no supplemental execution privileges essential” sans any consumer conversation.

Upcoming WEBINARWay Far too Susceptible: Uncovering the Point out of the Identity Attack Floor

Obtained MFA? PAM? Assistance account protection? Uncover out how effectively-geared up your corporation genuinely is versus id threats

Supercharge Your Expertise

Google claimed it has further plugged a critical security vulnerability in the Technique element that could lead to distant code execution without the need of demanding conversation on the portion of the target.

“The severity evaluation is primarily based on the influence that exploiting the vulnerability would quite possibly have on an impacted machine, assuming the platform and services mitigations are turned off for improvement purposes or if successfully bypassed,” it added.

In total, Google has preset 14 flaws in the Method module and two shortcomings in the MediaProvider element, the latter of which will be shipped as a Google Engage in method update.

Found this article fascinating? Adhere to us on Twitter  and LinkedIn to browse extra unique written content we article.


Some pieces of this short article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Alert: Phishing Campaigns Deliver New SideTwist Backdoor and Agent Tesla Variant
Next Post: Outlook Breach: Microsoft Reveals How a Crash Dump Led to a Major Security Breach outlook breach: microsoft reveals how a crash dump led to»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia
  • Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats
  • Chinese Hackers Using SugarGh0st RAT to Target South Korea and Uzbekistan
  • Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks
  • WhatsApp’s New Secret Code Feature Lets Users Protect Private Chats with Password
  • U.S. Treasury Sanctions North Korean Kimsuky Hackers and 8 Foreign Agents
  • Zyxel Releases Patches to Fix 15 Flaws in NAS, Firewall, and AP Devices
  • Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws
  • Google Unveils RETVec – Gmail’s New Defense Against Spam and Malicious Emails
  • North Korea’s Lazarus Group Rakes in $3 Billion from Cryptocurrency Hacks

Copyright © TheCyberSecurity.News, All Rights Reserved.