Google’s Android November 2021 security updates plug 18 flaws in the framework and system components and 18 more in the kernel and vendor components.
Among Google’s November Android security updates is a patch for a zero-working day weak spot that “may be below limited, targeted exploitation,” the enterprise reported.
Out of this month’s batch of 39 patches, 18 of them plug flaws in the framework and method elements and another 18 tackle vulnerabilities in the kernel and vendor factors.
Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
Use-Soon after-Free Flaw in the Kernel
Google described the one that attackers may be finding aside – CVE-2021-1048 – as prompted by a use-following-no cost (UAF) vulnerability in the kernel. UAF bugs permit for code substitution by employing a dangling pointer in dynamic memory. In this case, it can be exploited for area escalation of privilege and, when paired with a remote code execution (RCE) bug, an exploit could enable attackers to achieve administrative handle around a qualified program.
The internet titan kept its lips zipped about the particulars of the attacks exploiting CVE-2021-1048, but the truth that they are focused raises the probability of nation-point out highly developed persistent menace (APT) groups carrying them out for espionage.
There is precedent for that: Previously this yr, Android equipment ended up focused in an espionage marketing campaign that adapted the LodaRAT – acknowledged for focusing on Windows products – to also go after Android products in a marketing campaign that targeted Bangladesh.
Most Severe Issues
The most critical of the updates handle two critical remote code execution (RCE) vulnerabilities – tracked as CVE-2021-0918 and CVE-2021-0930 – in the Process ingredient. The flaws could help a remote attacker to execute arbitrary code within the context of a privileged procedure by sending a specially crafted transmission to qualified products.
“The severity assessment is primarily based on the effect that exploiting the vulnerability would probably have on an influenced unit, assuming the platform and assistance mitigations are turned off for development needs or if properly bypassed,” in accordance to the security update.
There are two a lot more critical security flaws resolved in this month’s patches: CVE-2021-1924 and CVE-2021-1975, the two of which have an effect on Qualcomm components.
Yet a different critical flaw can be found in Android Television remote support – which lets Android phones or tablets to be used as a distant for an Android Television. This one’s a different RCE, tracked as CVE-2021-0889. A nearby attacker who manages to exploit CVE-2021-0889 could creep up, silently pair with a Television set, and execute arbitrary code with no privileges or consumer interaction expected.
Superior-Severity Issues
Another 29 bugs are rated as superior-severity, with patches addressing vulnerabilities in the Framework, Media Framework, Procedure, kernel, Android Tv set, MediaTek and Qualcomm elements.
Google issued a different security advisory for Pixel equipment.
Verify out our free of charge upcoming reside and on-demand on-line town halls – exclusive, dynamic discussions with cybersecurity authorities and the Threatpost group.
Some sections of this post are sourced from:
threatpost.com