Android patchday: Attackers exploit kernel vulnerability

Important security updates have been released for Android 12, 12L, 13, 14 and 15. Attackers can compromise devices.

listen Print view
Stylized image: Smartphone with Android robot on the screen, on fire

Security vulnerabilities threaten Android smartphones.

(Image: Bild erstellt mit KI in Bing Designer durch heise online / dmk)

2 min. read

Anyone who owns an Android smartphone or tablet that is still under support should ensure that the latest security patches are installed. Attackers are already exploiting one vulnerability.

In a post on the current patchday, Google warns that there are signs that attackers are exploiting a vulnerability (CVE-2024-53104"high") "on a limited scale". The vulnerability affects the Linux kernel of Android.

The security problem is specifically found in the USB video class driver. Because the parsing of certain frames (UVC_VS_UNDEFINDED) is faulty, memory errors (out-of-bounds) occur. This serves as a loophole for malicious code.

Other vulnerabilities affect the framework and the system, among other things. At these points, attackers can gain higher rights or access information that is actually sealed off. However, successful attacks can also lead to DoS situations. In such cases, services or even the entire smartphone crashes.

Several components from MediaTek, Qualcomm and others are also vulnerable. A gap (CVE-2024-45569) in the WLAN component is classified as"critical". The description of the vulnerability states that successful attacks trigger a memory error.

Videos by heise

Google states that it has resolved the security problems in the security patch levels 2025-02-01 and 2025-02-05. In addition to Google, Samsung and LG, among others, also provide monthly security updates for selected devices (see box). The updates are also available in the Android Open Source Project Repository (AOSP).

Android-Patchday
Android-Patchday

Neben Google veröffentlichen noch weitere Hersteller regelmäßig Sicherheitspatches - aber meist nur für einige Produktserien. Geräte anderer Hersteller bekommen die Updates erheblich später oder, im schlimmsten Fall, gar nicht.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.