Google Releases Android Update to Patch Two Actively Exploited Vulnerabilities

Avatar
Google has shipped patches for 62 vulnerabilities, two of which it said have been exploited in the wild. The two high-severity vulnerabilities are listed below – CVE-2024-53150 (CVSS score: 7.8) – An out-of-bounds flaw in the USB sub-component of Kernel that could result in information disclosure CVE-2024-53197 (CVSS score: 7.8) – A privilege escalation flaw in the USB sub-component of Kernel
[[{“value”:”

Google has shipped patches for 62 vulnerabilities, two of which it said have been exploited in the wild.

The two high-severity vulnerabilities are listed below –

CVE-2024-53150 (CVSS score: 7.8) – An out-of-bounds flaw in the USB sub-component of Kernel that could result in information disclosure
CVE-2024-53197 (CVSS score: 7.8) – A privilege escalation flaw in the USB sub-component of Kernel

“The most severe of these issues is a critical security vulnerability in the System component that could lead to remote escalation of privilege with no additional execution privileges needed,” Google said in its monthly security bulletin for April 2025. “User interaction is not needed for exploitation.”

The tech giant also acknowledged that both the shortcomings may have come under “limited, targeted exploitation.”

It’s worth noting that CVE-2024-53197 is rooted in the Linux kernel and was patched last year, alongside CVE-2024-53104 and CVE-2024-50302. All three vulnerabilities, per Amnesty International, are said to have been chained together to break into a Serbian youth activist’s Android phone in December 2024.

While CVE-2024-53104 was addressed by Google in February 2025, CVE-2024-50302 was remediated last month. With the latest update, all three vulnerabilities have been fixed, effectively plugging the exploit path.

There are currently details on how CVE-2024-53150 has been exploited in real-world attacks, by whom, and who may have been targeted in those attacks. Users of Android devices are advised to apply the updates as and when Android original equipment manufacturers (OEMs) release them.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

“}]] The Hacker News 

Total
0
Shares
Previous Post

Hackers are pretending to be drone companies and state agencies to spy on Ukrainian victims

Next Post

CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation

Related Posts

Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support

A year after Microsoft announced passkeys support for consumer accounts, the tech giant has announced a big change that pushes individuals signing up for new accounts to use the phishing-resistant authentication method by default. "Brand new Microsoft accounts will now be 'passwordless by default,'" Microsoft's Joy Chik and Vasu Jakkal said. "New users will have several passwordless options for
Avatar
Read More

Gamma AI Platform Abused in Phishing Chain to Spoof Microsoft SharePoint Logins

Threat actors are leveraging an artificial intelligence (AI) powered presentation platform named Gamma in phishing attacks to direct unsuspecting users to spoofed Microsoft login pages. "Attackers weaponize Gamma, a relatively new AI-based presentation tool, to deliver a link to a fraudulent Microsoft SharePoint login portal," Abnormal Security researchers Callie Hinman Baron and Piotr Wojtyla
Avatar
Read More

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos RAT. "Threat actors delivered malicious LNK files embedded within ZIP archives, often disguised as Office documents," Qualys security researcher Akshay Thorve said in a technical report. "The attack chain leverages mshta.exe for
Avatar
Read More