Critical Zero-Day Kernel Vulnerability Actively Exploited in Android Devices

Google’s recent Android security updates have revealed a critical zero-day vulnerability, CVE-2024-36971, which has been actively exploited in targeted attacks. This flaw, found in the network route management of the Linux kernel, is a use-after-free (UAF) vulnerability that can lead to memory corruption. If successfully exploited, this vulnerability could allow attackers to execute arbitrary code without user interaction, potentially giving them complete control over the affected device. While Google has confirmed that this vulnerability has been exploited in limited and targeted attacks, specific details about the threat actors and their motivations have not been disclosed.

The 2024-08-01 security patch level addresses 13 high-severity vulnerabilities in the Android Framework, including 11 vulnerabilities that could lead to privilege escalation, one that could result in information disclosure, and one that could cause a denial-of-service (DoS). Additionally, a high-severity vulnerability in the System component has been fixed. These vulnerabilities pose significant risks, as they could allow attackers to escalate privileges, access sensitive information, or disrupt services on affected devices.

Furthermore, the 2024-08-05 security patch level includes fixes for 32 vulnerabilities across various components, including Kernel components, Arm components, Imagination Technologies, MediaTek components, Qualcomm components, and Qualcomm closed-source components. Among these, a critical vulnerability (CVE-2024-23350) in Qualcomm closed-source components has been addressed. Android users are strongly urged to apply both the 2024-08-01 and 2024-08-05 security patch levels immediately to mitigate these threats and protect their devices from potential exploitation. Delaying updates could leave users vulnerable to significant security risks, particularly given the active exploitation of CVE-2024-36971.

Share This: