CONFERENCE Watch Now: Threat Detection & Incident Response (TDIR) Summit - Watch Event On-Demand
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Google Patches Two Android Vulnerabilities Exploited in Targeted Attacks

Google warns of the limited, targeted exploitation of two vulnerabilities resolved with the latest Android security update.

Android security updates

Google on Monday announced patches for more than 40 vulnerabilities as part of Android’s November 2024 set of security updates, including two flaws that have been exploited in attacks.

Tracked as CVE-2024-43047, the first of the exploited security defects was disclosed last month, after Amnesty International and Google’s Threat Analysis Group (TAG) found evidence of in-the-wild exploitation.

Qualcomm released patches for the issue last month, warning that it affects dozens of chipsets and describing it as a high-severity use-after-free bug in the Digital Signal Processor (DSP) service.

“Patches for the issue affecting FASTRPC driver have been made available to OEMs together with a strong recommendation to deploy the update on affected devices as soon as possible,” Qualcomm said last month.

The fact that CVE-2024-43047 was discovered by Google and Amnesty suggests that it has likely been exploited by a commercial spyware vendor against Android devices. 

The second exploited vulnerability, tracked as CVE-2024-43093, is a high-severity elevation of privilege bug in Android’s Framework component. It also impacts the Documents UI component of Project Mainline, which was updated through Google Play.

While warning that it has indicators that both CVE-2024-43047 and CVE-2024-43093 “may be under limited, targeted exploitation”, Google has not shared specific information on the observed attacks.

CVE-2024-43093 was addressed with the first part of Android’s November 2024 security updates, which arrive on devices as a 2024-11-01 security patch level, addressing a total of 17 high-severity vulnerabilities in the Framework and System components.

Advertisement. Scroll to continue reading.

The second part of the update, which arrives on devices as the 2024-11-05 security patch level, contains fixes for 23 vulnerabilities, including CVE-2024-43047. It also includes updated kernel versions, Google notes in its advisory.

On Monday, Google also announced that the November 2024 security update for Wear OS contains patches for two bugs in addition to fixes for the flaws described in Android’s November 2024 bulletin.

The Android Automotive OS update bulletin for November 2024 contains no new patches aside from those in the Android bulletin.

Related: Google Warns of Samsung Zero-Day Exploited in the Wild

Related: Necro Trojan Infects Google Play Apps With Millions of Downloads

Related: Nearly 300 Vulnerabilities Patched in Huawei’s HarmonyOS in 2022

Related: CISA Warns Recent Microsoft SharePoint RCE Flaw Exploited in Attacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Jeremy Koppen has left Mandiant after 13 years to become the CISO of Equifax.

Engineering and technology solutions provider Amentum has appointed Max Shier as its CISO.

PAM provider Keeper Security has appointed Shane Barney as its Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.