Android Zero-Day Vulnerabilities Actively Exploited In Attacks, Patch Now!


Two zero-day vulnerabilities have been discovered and are currently being exploited in targeted attacks.

The vulnerabilities, identified as CVE-2024-43047 and CVE-2024-43093, were disclosed in Android’s latest security bulletin, prompting urgent calls for users to update their devices immediately.

SIEM as a Service

CVE-2024-43047, a high-severity vulnerability with a CVSS score of 7.8, affects Qualcomm chipsets used in millions of Android devices.

This use-after-free flaw in Qualcomm’s FastRPC driver could allow attackers to execute arbitrary code, potentially leading to unauthorized access and privilege escalation.

Build an in-house SOC or outsource SOC-as-a-Service -> Calculate Costs

The vulnerability impacts dozens of Qualcomm’s chipsets, including the popular Snapdragon 8 (Gen 1) mobile platform, which is used in numerous Android phones from manufacturers such as Motorola, Samsung, OnePlus, Oppo, Xiaomi, and ZTE.

Qualcomm has confirmed that the vulnerability “may be under limited, targeted exploitation,” citing information from Google’s Threat Analysis Group (TAG).

The second vulnerability, CVE-2024-43093, is also reported to be under active exploitation. However, details about this flaw are currently limited as it is still undergoing formal review and documentation.

Security experts warn that attackers are increasingly targeting mobile devices to access corporate data and exploit supply chains.

Kern Smith, vice president of global sales engineering at Zimperium, emphasized that “Mobile devices face the same or similar challenges like any other endpoint, especially when they’re critical to our personal and also to our professional lives”.

Both Google and Qualcomm have released patches for these vulnerabilities.

Qualcomm stated that fixes were made available to their customers in September 2024, and they are now urging device manufacturers to deploy the patches as soon as possible.

Android users are strongly advised to check for and install the latest security updates on their devices. These updates are typically found in the device’s “Settings” menu under the system update section.

Given the active exploitation of these vulnerabilities, prompt action is crucial to mitigate potential risks.

As the threat landscape evolves, staying vigilant and keeping devices up-to-date remains a critical aspect of cybersecurity for both individual users and organizations relying on Android-based systems.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!



Source link