• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Higher Severity Android Rce Flaw Fixed In August Security Update

Higher-Severity Android RCE Flaw Fixed in August Security Update

You are here: Home / Latest Cyber Security Vulnerabilities / Higher-Severity Android RCE Flaw Fixed in August Security Update
August 5, 2020

Google dealt with substantial-severity and critical flaws tied to 54 CVEs in this month’s Android security bulletin.

Google has introduced patches addressing a higher-severity issue in its Framework component, which if exploited could enable distant code execution (RCE) on Android cellular devices.

In general, 54 large-severity flaws were being patched as aspect of Google’s August security updates for the Android running program, released on Monday. As part of this, Qualcomm, whose chips are made use of in Android devices, patched a combine of higher and critical-severity vulnerabilities tied to 31 CVEs.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The RCE flaw, the most really serious of these flaws, exists in the Android Framework, which is a established of APIs – consisting of program equipment and user interface design instruments – that enable developers to speedily and very easily produce apps for Android telephones.

The flaw (CVE-2020-0240) “could permit a distant attacker working with a specially crafted file to execute arbitrary code within the context of an unprivileged method,” according to Google’s security bulletin. It has been dealt with for devices managing on edition 10 of the Android running method.

Other higher-severity flaws in the Framework contain two elevation-of-privilege (EoP) vulnerabilities (CVE-2020-0238 and CVE-2020-0257), three information disclosure glitches (CVE-2020-0239, CVE-2020-0249 and CVE-2020-0258) and a Denial-of-Service (DoS) flaw (CVE-2020-0247).

Google also produced fixes for a few large-severity flaws in Android’s Media framework, which consists of aid for enjoying a wide variety of frequent media kinds, so that consumers can simply use audio, video clip and photographs. The issues (CVE-2020-0241, CVE-2020-0242, CVE-2020-0243) are EoP flaws.

Also preset were being four higher-severity flaws in the Android Procedure area, which includes two EoP issues (CVE-2020-0108 and CVE-2020-0256) and two information and facts disclosure glitches (CVE-2020-0248 and CVE-2020-0250). These “could help a local destructive software to bypass consumer interaction demands in purchase to achieve accessibility to added permissions,” in accordance to Google.

Parts

Google also rolled out patches for flaws in numerous 3rd-party factors in its Android ecosystem. One this kind of flaw (CVE-2020-0259) exists in a part by AMLogic, which is a organization that models and sells SoC (Procedure on Chip) integrated circuits. The certain compent is dm-verity, which allows reduce persistent rootkits that can maintain onto root privileges and compromise devices. This EoP flaw could permit a “local attacker using a specifically crafted file to execute arbitrary code inside the context of a privileged method,” according to Google.

Numerous flaws were also set in the Kernel factors utilised in Android, which includes an EoP flaw (CVE-2020-0255) in the SELinux element and one particular (CVE-2020-12464) in the Linux USB Subsystem as very well as an information disclosure flaw (CVE-2019-16746) in the Linux Wireless Subsystem.

Also set had been quite a few MediaTek factors affecting the Multimedia Processing Driver, which bolsters the processing of media like video clip. These consist of three substantial-severity EoP flaws (CVE-2020-0252, CVE-2020-0253, CVE-2020-0260) and two details disclosure glitches (CVE-2020-0251 and CVE-2020-0254).

Eventually, 31 critical and large-severity flaws have been resolved in Qualcomm components, which include a critical flaw in the WLAN (CVE-2020-11116) element and 5 critical flaws patched (CVE-2019-10562, CVE-2019-10615, CVE-2019-13998, CVE-2020-3619 and CVE-2020-3667) in “closed-supply parts.”

Maker Updates

Makers of Android devices normally press out their have patches to handle updates in tandem with or just after the Google Security Bulletin. Samsung claimed in an August security upkeep release that it is releasing many of the Android security bulletin patches, including those addressing critical flaws, CVE-2020-3699 and CVE-2020-3698, to significant Samsung versions. And, a bulletin claimed, a security update for Pixel units, which operate on Google’s Android functioning technique, is “coming soon.”

Android has faced several security issues in the previous. In July, scientists uncovered that Android customers had been qualified by cellular malware or cellular adware and experienced a method partition an infection, building the destructive data files practically undeletable. And in June, Google has dealt with two critical flaws in its newest regular Android update that enable remote code execution (RCE) on Android mobile products.

Complimentary Threatpost Webinar: Want to master more about Private Computing and how it can supercharge your cloud security? This webinar “Cloud Security Audit: A Confidential Computing Roundtable” brings leading cloud-security gurus from Microsoft and Fortanix together to examine how Confidential Computing is a game changer for securing dynamic cloud knowledge and blocking IP publicity. Sign up for us  Wednesday Aug. 12 at 2pm ET for this FREE live webinar with Dr. David Thaler, software package architect, Microsoft and Dr Richard Searle, security architect, Fortanix – the two with the Confidential Computing Consortium. Register Now.

Previous Post: «Microsoft Groups Patch Bypass Will Allow Rce Microsoft Groups Patch Bypass Will allow RCE
Next Post: Scientists Name Condition with Fewest Info Breaches Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.