Google has released patches for 47 security flaws in Android, including one that is actively being exploited. CVE-2024-53104 (CVSS score: 7.8) is a vulnerability that allows privilege escalation in the USB Video Class (UVC) driver kernel component.
Successful exploitation of the flaw could lead to physical escalation of privilege, Google said, noting that it’s aware that it may be under “limited, targeted exploitation.”
By infosecbulletin
/ Wednesday , March 12 2025
On Tuesday, Apple fixed a critical zero-day vulnerability affecting nearly all supported iPhones and iPads. The company noted that it...
Read More
By infosecbulletin
/ Wednesday , March 12 2025
Microsoft's March 2025 Patch Tuesday update fixes 57 flaws, including seven zero-day exploits, six of which are actively being exploited....
Read More
By infosecbulletin
/ Tuesday , March 11 2025
Cato CRTL team said, a new botnet campaign dubbed Ballista target the unpatched TP-Link Archer routers. CVE-2023-1389 is a serious...
Read More
By infosecbulletin
/ Tuesday , March 11 2025
A critical vulnerability, CVE-2025-24813, has been found in Apache Tomcat, which could let attackers execute remote code, leak sensitive data,...
Read More
By infosecbulletin
/ Tuesday , March 11 2025
CISA included three vulnerabilities in Ivanti Endpoint Manager—CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161—in its Known Exploited Vulnerabilities catalog. Federal agencies must address...
Read More
By infosecbulletin
/ Sunday , March 9 2025
Ransomware attacks reached a record high in February, surpassing previous months, according to a Cyble report. The Cyble report tracked...
Read More
By infosecbulletin
/ Saturday , March 8 2025
NTT Communications Corporation discovered illegal access to its facilities on February 5 and confirmed on February 6 that some information...
Read More
By infosecbulletin
/ Friday , March 7 2025
India's Maharashtra Deputy Chief Minister Devendra Fadnavis disclosed alarming cyber fraud figures for Pune in 2024 during the Assembly session....
Read More
By infosecbulletin
/ Friday , March 7 2025
Cybersecurity researcher Jeremiah Fowler found that over a dozen unprotected databases from the German firm Lost and Found Software exposed...
Read More
By infosecbulletin
/ Friday , March 7 2025
Cisco Talos found that an unknown attacker has been targeting organizations in Japan since January 2025. The attacker exploited the...
Read More
The specific details about the vulnerability have not been shared, but Linux kernel developer Greg Kroah-Hartman mentioned in early December 2024 that it originates in the Linux kernel, first appearing in version 2.6.26, released in mid-2008.
Specifically, it has to do with an out-of-bounds write condition that could arise as a result of parsing frames of type UVC_VS_UNDEFINED in a function named “uvc_parse_format()” in the “uvc_driver.c” program.
This flaw could lead to memory corruption, program crashes, or unauthorized code execution.
It’s unclear who is exploiting the vulnerability, but GrapheneOS suggests it could be misused by forensic data extraction tools for physical privilege escalation.
Google’s monthly security updates also fixed a critical flaw in Qualcomm’s WLAN component (CVE-2024-45569, CVSS score: 9.8) that could cause memory corruption.
Google has released two security patch levels, 2025-02-01 and 2025-02-05, to help Android partners quickly address similar vulnerabilities across devices.
“Android partners are encouraged to fix all issues in this bulletin and use the latest security patch level,” Google said.