Description

Google has issued a warning about an Android security vulnerability, tracked as CVE-2024-43093, which is currently being exploited in the wild. The flaw, located in the Android Framework component, enables privilege escalation, potentially granting unauthorized access to sensitive directories, including "Android/data," "Android/obb," and "Android/sandbox." While details on how the vulnerability is being exploited are sparse, Google’s security bulletin indicates that it is likely being targeted in specific, limited attacks. The issue could be used to bypass security measures and gain elevated system permissions. Google also reported that Qualcomm chipsets have a flaw, CVE-2024-43047, that is actively exploited. Using this issue, a use-after-free vulnerability within the Digital Signal Processor (DSP) service, could compromise device functionality. Qualcomm has credited Google Project Zero researchers Seth Jenkins and Conghui Wang with discovering this flaw, while Amnesty International’s Security Lab confirmed its exploitation in real-world scenarios. However, details on the nature of the exploit or the timeline of the attacks remain unclear, though it’s suspected to be used in highly targeted campaigns, possibly involving spyware attacks against civil society members. This marks the second instance of an actively exploited Android Framework vulnerability, following CVE-2024-32896, which was patched earlier this year. Initially fixed only for Pixel devices, Google later confirmed that it affected the wider Android ecosystem. The potential for CVE-2024-43093 and CVE-2024-43047 to work in tandem as part of a combined exploit remains uncertain.