Google has issued a warning about an Android security vulnerability, tracked as CVE-2024-43093, which is currently being exploited in the wild. The flaw, located in the Android Framework component, enables privilege escalation, potentially granting unauthorized access to sensitive directories, including "Android/data," "Android/obb," and "Android/sandbox." While details on how the vulnerability is being exploited are sparse, Google’s security bulletin indicates that it is likely being targeted in specific, limited attacks. The issue could be used to bypass security measures and gain elevated system permissions. Google also reported that Qualcomm chipsets have a flaw, CVE-2024-43047, that is actively exploited. Using this issue, a use-after-free vulnerability within the Digital Signal Processor (DSP) service, could compromise device functionality. Qualcomm has credited Google Project Zero researchers Seth Jenkins and Conghui Wang with discovering this flaw, while Amnesty International’s Security Lab confirmed its exploitation in real-world scenarios. However, details on the nature of the exploit or the timeline of the attacks remain unclear, though it’s suspected to be used in highly targeted campaigns, possibly involving spyware attacks against civil society members. This marks the second instance of an actively exploited Android Framework vulnerability, following CVE-2024-32896, which was patched earlier this year. Initially fixed only for Pixel devices, Google later confirmed that it affected the wider Android ecosystem. The potential for CVE-2024-43093 and CVE-2024-43047 to work in tandem as part of a combined exploit remains uncertain.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...