Google's March 2025 Android Security Bulletin has highlighted two severe vulnerabilities—CVE-2024-43093 and CVE-2024-50302—that are currently being targeted in limited attacks. These flaws, affecting Android versions 12 through 15, represent significant security risks for billions of users. The bulletin stresses the urgency of installing the March 5, 2025, security patch, which addresses critical remote code execution (RCE) and privilege escalation issues. The more severe vulnerability, CVE-2024-43093, is found in Android’s System component and allows remote code execution without requiring extra user privileges. Exploiting this flaw could give attackers full control of a device, enabling them to steal sensitive data or install malware. This vulnerability, which affects Android 12 through 15, is deemed "Critical" due to its high impact and ease of exploitation. Although patches have been released to the Android Open Source Project (AOSP), earlier mitigations have been bypassed, making unpatched devices especially vulnerable. CVE-2024-50302 is a local privilege escalation issue within the Android framework. It allows attackers with physical access or those using malware to gain root access, bypassing security restrictions. This flaw affects devices running Android 10 or later and originates from improper access controls in Linux kernel subsystems. While exploitation requires user interaction, social engineering techniques, like phishing, could be used to trigger the vulnerability. Google has already shared patches with partners, but delays in OEM rollouts leave many devices exposed. The March 2025 patch addresses these vulnerabilities, but Google urges users to stay vigilant. They recommend regularly checking for security updates, avoiding unverified apps, and enabling Google Play Protect. Despite these protections, many devices—especially older or budget models—remain at risk, underscoring the need for timely updates. With a sharp increase in Android-related attacks in 2025, the Android team emphasizes that users should prioritize updates as their primary defense against potential exploits.
A malicious npm package named duer-js has been discovered distributing a powerful information-stealing malware dubbed “Bada Stealer.” The package masquerades as a legitimate Ja...
Security researchers have identified a privacy weakness in certain adblock filter lists that could allow attackers to expose users’ real IP addresses and approximate locations. T...
Cybersecurity researchers have uncovered a coordinated campaign linked to the North Korea–associated Lazarus Group involving malicious packages published on npm and the Python Pa...