• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Zero-Day Alert: Latest Android Patch Update Includes Fix for Newly Actively Exploited Flaw

You are here: Home / General Cyber Security News / Zero-Day Alert: Latest Android Patch Update Includes Fix for Newly Actively Exploited Flaw
September 6, 2023

Android Patch Update

Google has rolled out month-to-month security patches for Android to tackle a range of flaws, including a zero-day bug that it said may have been exploited in the wild.

Tracked as CVE-2023-35674, the superior-severity vulnerability is described as a situation of privilege escalation impacting the Android Framework.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“There are indications that CVE-2023-35674 might be below restricted, targeted exploitation,” the firm explained in its Android Security Bulletin for September 2023 without the need of delving into supplemental specifics.

The update also addresses 3 other privilege escalation flaws in Framework, with the search big noting that the most intense of these issues “could lead to community escalation of privilege with no supplemental execution privileges essential” sans any consumer conversation.

Upcoming WEBINARWay Far too Susceptible: Uncovering the Point out of the Identity Attack Floor

Obtained MFA? PAM? Assistance account protection? Uncover out how effectively-geared up your corporation genuinely is versus id threats

Supercharge Your Expertise

Google claimed it has further plugged a critical security vulnerability in the Technique element that could lead to distant code execution without the need of demanding conversation on the portion of the target.

“The severity evaluation is primarily based on the influence that exploiting the vulnerability would quite possibly have on an impacted machine, assuming the platform and services mitigations are turned off for improvement purposes or if successfully bypassed,” it added.

In total, Google has preset 14 flaws in the Method module and two shortcomings in the MediaProvider element, the latter of which will be shipped as a Google Engage in method update.

Found this article fascinating? Adhere to us on Twitter  and LinkedIn to browse extra unique written content we article.


Some pieces of this short article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Alert: Phishing Campaigns Deliver New SideTwist Backdoor and Agent Tesla Variant
Next Post: Outlook Breach: Microsoft Reveals How a Crash Dump Led to a Major Security Breach outlook breach: microsoft reveals how a crash dump led to»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.