Google this week announced the release of patches for 39 vulnerabilities as part of the March 2022 security update for Android.
The most serious vulnerability is CVE-2021-39708, a remotely exploitable elevation of privilege issue identified in the System component.
“The most severe of these issues is a critical security vulnerability in the System component that could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation,” Google notes in its advisory.
The first part of this month’s set of patches arrives on devices as the 2022-03-01 security patch level and addresses CVE-2021-39708, along with 17 other bugs.
A total of 10 security issues were resolved in the System component (nine elevation of privilege and one information disclosure vulnerability), six flaws were resolved in Framework (four elevation of privilege and two denial of service bugs), one was patched in Android runtime (elevation of privilege) and one in Media Framework (information disclosure).
The March 2022 Android security updates also resolve 21 vulnerabilities as part of the 2022-03-05 security patch level.
These impact Framework, Kernel components, MediaTek components, Qualcomm components, and Qualcomm closed-source components.
Two other Google Play system updates addressed vulnerabilities in media codecs and permission controller components, Google says.
On Google Pixel devices, a patch level of 2022-03-05 or later addresses all of these vulnerabilities along with 41 other security holes that affect Kernel components (13 flaws), Pixel (26), Qualcomm components (1) and Qualcomm closed-source components (1).
Related: Android’s February 2022 Security Updates Patch 36 Vulnerabilities
Related: Google Patches 48 Vulnerabilities With First Set of 2022 Android Updates

More from Ionut Arghire
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Malicious NPM, PyPI Packages Stealing User Information
Latest News
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
