Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution with no additional execution privileges needed. These flaws, actively exploited in coordinated attacks, target devices running Android versions 12 through 15 and have already been linked to high-profile breaches involving activist devices.

CVE-2024-43093: System Component Privilege Escalation

CVE-2024-50302: Linux Kernel HID Core Memory Leak

Systems Affected

  • Android OS patch levels prior to 2025-03-05

What You Should Do

  • Verify Security Patch Status: Users should immediately check their device’s security patch level by navigating to Settings > About Phone > Android Version. Devices showing a patch date earlier than March 2025 remain vulnerable and should be updated as soon as possible.
  • Install Updates Promptly: When an update becomes available, install it immediately. The March 2025 patch addresses CVE-2024-43093 and CVE-2024-50302, mitigating the risks posed by these critical flaws.
  • Enable Google Play Protect: Activating Google Play Protect ensures that real-time app scanning is in place to detect potentially malicious applications that might exploit these vulnerabilities.
  • Monitor OEM Advisories: Keep an eye on updates from your device’s manufacturer. Given the delays in patch rollouts from some OEMs, staying informed about any advisories or additional patches may be released is essential.
  • Conduct Enterprise Audits: For organizations, it is imperative to audit the security patch status of all devices within the network. This can be achieved by utilizing mobile device management (MDM) tools to ensure compliance with the latest security standards.
  • Educate and Inform: Users should know the risks associated with outdated software. Regularly disseminating information on mobile security best practices can help mitigate the risk of exploitation.

Questions?  Reach out to a member of the BMT Security Team!