[ad_1]
Google has rolled out month-to-month safety patches for Android to handle quite a lot of flaws, together with a zero-day bug that it mentioned might have been exploited within the wild.
Tracked as CVE-2023-35674, the high-severity vulnerability is described as a case of privilege escalation impacting the Android Framework.
“There are indications that CVE-2023-35674 could also be below restricted, focused exploitation,” the corporate mentioned in its Android Safety Bulletin for September 2023 with out delving into extra specifics.
The replace additionally addresses three different privilege escalation flaws in Framework, with the search big noting that probably the most extreme of those points “might result in native escalation of privilege with no extra execution privileges wanted” sans any person interplay.
Approach Too Susceptible: Uncovering the State of the Id Assault Floor
Achieved MFA? PAM? Service account safety? Learn how well-equipped your group actually is in opposition to identification threats
Google mentioned it has additional plugged a crucial safety vulnerability within the System element that might result in distant code execution with out requiring interplay on the a part of the sufferer.
“The severity evaluation is predicated on the impact that exploiting the vulnerability might have on an affected machine, assuming the platform and repair mitigations are turned off for growth functions or if efficiently bypassed,” it added.
In whole, Google has fastened 14 flaws within the System module and two shortcomings within the MediaProvider element, the latter of which might be delivered as a Google Play system replace.
[ad_2]