• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
android patches actively exploited zero day kernel bug

Android Patches Actively Exploited Zero-Day Kernel Bug

You are here: Home / Latest Cyber Security Vulnerabilities / Android Patches Actively Exploited Zero-Day Kernel Bug
November 2, 2021

Google’s Android November 2021 security updates plug 18 flaws in the framework and system components and 18 more in the kernel and vendor components.

Among Google’s November Android security updates is a patch for a zero-working day weak spot that “may be below limited, targeted exploitation,” the enterprise reported.

Out of this month’s batch of 39 patches, 18 of them plug flaws in the framework and method elements and another 18 tackle vulnerabilities in the kernel and vendor factors.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Use-Soon after-Free Flaw in the Kernel

Google described the one that attackers may be finding aside – CVE-2021-1048 – as prompted by a use-following-no cost (UAF) vulnerability in the kernel. UAF bugs permit for code substitution by employing a dangling pointer in dynamic memory. In this case, it can be exploited for area escalation of privilege and, when paired with a remote code execution (RCE) bug, an exploit could enable attackers to achieve administrative handle around a qualified program.

The internet titan kept its lips zipped about the particulars of the attacks exploiting CVE-2021-1048, but the truth that they are focused raises the probability of nation-point out highly developed persistent menace (APT) groups carrying them out for espionage.

There is precedent for that: Previously this yr, Android equipment ended up focused in an espionage marketing campaign that adapted the LodaRAT – acknowledged for focusing on Windows products – to also go after Android products in a marketing campaign that targeted Bangladesh.

Most Severe Issues

The most critical of the updates handle two critical remote code execution (RCE) vulnerabilities – tracked as CVE-2021-0918 and CVE-2021-0930 – in the Process ingredient. The flaws could help a remote attacker to execute arbitrary code within the context of a privileged procedure by sending a specially crafted transmission to qualified products.

“The severity assessment is primarily based on the effect that exploiting the vulnerability would probably have on an influenced unit, assuming the platform and assistance mitigations are turned off for development needs or if properly bypassed,” in accordance to the security update.

There are two a lot more critical security flaws resolved in this month’s patches: CVE-2021-1924 and CVE-2021-1975, the two of which have an effect on Qualcomm components.

Yet a different critical flaw can be found in Android Television remote support – which lets Android phones or tablets to be used as a distant for an Android Television. This one’s a different RCE, tracked as CVE-2021-0889. A nearby attacker who manages to exploit CVE-2021-0889 could creep up, silently pair with a Television set, and execute arbitrary code with no privileges or consumer interaction expected.

Superior-Severity Issues

Another 29 bugs are rated as superior-severity, with patches addressing vulnerabilities in the Framework, Media Framework, Procedure, kernel, Android Tv set, MediaTek and Qualcomm elements.

Google issued a different security advisory for Pixel equipment.

Verify out our free of charge upcoming reside and on-demand on-line town halls – exclusive, dynamic discussions with cybersecurity authorities and the Threatpost group.


Some sections of this post are sourced from:
threatpost.com

Previous Post: «microsoft unveils defender for business at ignite 2021 Microsoft unveils Defender for Business at Ignite 2021
Next Post: FTC Updates Safeguards Rule Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.