TechCritical flaw in Android: Google has patched it, but this is only half of the story

Critical flaw in Android: Google has patched it, but this is only half of the story

An acute flaw has been identified in Android, which Google has fixed with the December security bulletin. This issue affects versions 11, 12, 12L, 13, and 14 of Android, which make up a significant portion of the popular releases worldwide. However, Google's intervention does not immediately guarantee user safety.

Smartphone with Android
Smartphone with Android
Images source: © Dobreprogramy

11:39 PM EST, December 5, 2023

Further details can be found in the Android security bulletin released on December 4th. Android Central highlights the most serious complication, marked with the symbol CVE-2023-40088. It allows the potential of executing a use-after-free attack following one of the stages of Android's operation when handling wireless connectivity. This could lead to the execution of arbitrary code on the phone.

Although theoretically, the flaw can be exploited remotely, in reality, the threat is somewhat limited. A connection within the same Wi-Fi network is necessary, or a proximity to the victim - to leverage a Bluetooth or NFC connection (similar to a recently identified issue with Bluetooth connectivity). Google has rated the CVE-2023-40088 flaw as critical. According to Google, it has been fixed in Android 11, 12, 12L, 13, and 14 - versions of Android that, according to data from statcounter, operate over 72 percent of the devices on the market.

Unfortunately, Google's resolution of the issue in the Android patch bulletin does not instantly provide safety to all devices on the market. Updates are still necessary from smartphone manufacturers, who distribute them using their over-the-air (OTA) update systems.

The speed of patching such flaws on end-user devices is not what Android is famous for. Consequently, users should be prepared for several weeks before the fixes reach all devices that are eligible for updates. Regrettably, some devices may never receive the required security update due to their support period ending.

Related content
© essanews.com
·

Downloading, reproduction, storage, or any other use of content available on this website—regardless of its nature and form of expression (in particular, but not limited to verbal, verbal-musical, musical, audiovisual, audio, textual, graphic, and the data and information contained therein, databases and the data contained therein) and its form (e.g., literary, journalistic, scientific, cartographic, computer programs, visual arts, photographic)—requires prior and explicit consent from Wirtualna Polska Media Spółka Akcyjna, headquartered in Warsaw, the owner of this website, regardless of the method of exploration and the technique used (manual or automated, including the use of machine learning or artificial intelligence programs). The above restriction does not apply solely to facilitate their search by internet search engines and uses within contractual relations or permitted use as specified by applicable law.Detailed information regarding this notice can be found  here.