fbpx

Android security updates: 7 critical vulnerabilities fixed

Google releases its monthly update for its Nexus users; which eliminated some severe security vulnerabilities in its Android OS. The latest update patches a bug which can be exploited by an MMS, Email or a website which contains a specially crafted media file.

These patched flaws are effecting Android KitKat 4.4.4,  Android Lollipop 5.1 and Android 6.0 versions. Two critical remote execution vulnerabilities in media server could allow an attacker to cause memory corruption and remote code execution as the media server process.

The patched bugs are reported on January 4th this year. Blackberry was the only vendor who released an update for its PRIV handsets, within few hours of Google’s OTA update for Nexus users. Samsung users will have to wait for a week or two before they update their Android handsets.

The critical flaws which are fixed in Nexus devices are:

  • Remote Code Execution Vulnerability in Broadcom Wi-Fi Driver
  • Remote Code Execution Vulnerability in Mediaserver
  • Elevation of Privilege Vulnerability in Qualcomm Performance Module
  • Elevation of Privilege Vulnerability in Qualcomm Wi-Fi Driver
  • Elevation of Privilege Vulnerability in the Debugger Daemon 
This is the seventh update Google has released since the start of its monthly security update program in June last year. Android security researchers earned around $200,000 since the program is launched. 
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What are Online Casinos doing to be as Safe and Secure as Possible?

Online casinos have continued to increase in popularity over recent years as more and more gamblers have turned to virtual options to further enhance...

Reconnaissance for Bug Bounty Hunters & Pentesters

New to the bug bounty and confused about where to start? Worry not! This reconnaissance for bug bounty hunters guides you to take the...

Access & Manage Android Phone Remotely – L3MON Tutorial

There is software available, like Metasploit, to gain remote access to any android phone. But other than that, we have the L3MON tool (A...

How to Hide Shellcode Behind Closed Port?

Every company has a variety of scanners for analyzing its network and identifying new or unknown open ports. It's unthinkable to disguise the potentially...