Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under limited, targeted exploitation. These flaws affect Android versions 12 to 15, posing increasing risks for billions of devices.
The bulletin requires the immediate installation of the 2025-03-05 security patch to address remote code execution and privilege escalation vulnerabilities.
By infosecbulletin
/ Tuesday , March 4 2025
Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under limited, targeted exploitation. These flaws affect...
Read More
By infosecbulletin
/ Tuesday , March 4 2025
CISA has advised US federal agencies to secure their systems against attacks targeting vulnerabilities in Cisco and Windows. Although these...
Read More
By infosecbulletin
/ Monday , March 3 2025
MediaTek has released its March 2025 Product Security Bulletin, which highlights new security vulnerabilities affecting various chipsets in smartphones, tablets,...
Read More
By infosecbulletin
/ Monday , March 3 2025
Qualcomm's March 2025 Security Bulletin addresses vulnerabilities in its products, including automotive systems, mobile chipsets, and networking devices. It includes...
Read More
By infosecbulletin
/ Monday , March 3 2025
On Sunday, Poland Minister for Digitalisation Krzysztof Gawkowski said that Polish cybersecurity services found unauthorized access to the IT infrastructure...
Read More
By infosecbulletin
/ Monday , March 3 2025
Security researchers found that datasets used by companies to develop large language models included API keys, passwords, and other sensitive...
Read More
By infosecbulletin
/ Sunday , March 2 2025
Amnesty International’s Security Lab discovered a cyber-espionage campaign in Serbia, where officials used a zero-day exploit from Cellebrite to unlock...
Read More
By infosecbulletin
/ Saturday , March 1 2025
DragonForce ransomware targets organizations in Saudi Arabia. An attack on a major Riyadh real estate and construction firm led to...
Read More
By infosecbulletin
/ Saturday , March 1 2025
Microsoft has filed an amended complaint in recent civil litigation, naming the main developers of malicious tools that bypass the...
Read More
By infosecbulletin
/ Friday , February 28 2025
At the Global Investors Summit 2025, Union Minister Ashwini Vaishnaw announced that India’s first indigenous semiconductor chip will be ready...
Read More
Two Critical Android Vulnerabilities
CVE-2024-43093: System Component Privilege Escalation:
This vulnerability, rated CVSS 7.8, allows malicious apps to bypass Android’s sandboxing due to improper validation of inter-process communication (IPC) messages. Attackers can exploit weak permission checks in the System component to access restricted directories, such as Android/data and Android/sandbox, gaining unauthorized control over sensitive operations.
The November 2024 patch restricts directory permissions and validates IPC inputs, but many devices remain vulnerable due to slow updates from OEMs, especially those depending on third-party manufacturers.
CVE-2024-50302: Linux Kernel HID Core Memory Leak
A severe vulnerability in the Linux kernel’s Human Interface Device (HID) subsystem, identified as CVE-2024-50302, enables unauthenticated attackers to access uninitialized kernel memory through specially crafted USB HID reports.
The issue arises because the kernel does not zero-initialize the report_buffer during allocation, allowing sensitive data like encryption keys or authentication tokens to be exposed. In December 2024, Serbian authorities exploited this vulnerability, along with CVE-2024-53104 (UVC driver overflow), to unlock a student activist’s device.
Kaspersky reports a 300% increase in Android attacks since January 2025, with CVE-2024-43093 associated with state-sponsored hackers.
CISA adds Cisco and Windows vulns as actively exploited