Currently, the attackers are targeting Android smartphones and attacking devices. Security patch is available for selected equipment. Following successful attacks, unauthorized access in areas of mobile operating systems is really possible.
Advertisement
Attack attack!
Already in November last year, Google warned that the attackers warned a weak point (CVE 2024–43093 “in the structure.High“) Exploitation. Why are they doing again, Current warning message does not appearWeak point worries about task shouldHideDocument
In the external storage provider. Java.
If the attackers successfully start with it, you can handle the access filter to see the system directors. This can expand user rights. So that the attacks work, the victims should be Description But play together. How this kind of attack can work in detail is not yet known.
The second attacked vulnerable (CVE-2024-50302 “medium“) The kernel is worrying about the sub-scores hidden. At this point, unauthorized access to the kernel store is possible. To what extent the attacks run is not clear. Google speaks of target attacks to a limited range.
More danger
Many safety intervals in the system are considered “Serious“(For example Cve-2025-0074). At these points, the attackers may begin for malicious code attacks. In addition, data can be leaked or an attacker can crash the software through the DOS attack.
Android developers states that security problems Patch level 2025-03-01 And 2015-03-05 To solve. Apart from Google, manufacturers like LG and Samsung also provide monthly updates for some devices (see box).

In addition to Google, other manufacturers regularly publish security patch – but mostly only for a few products series. The devices of other manufacturers are later updated or, not at all, in the worst position.
(DES)
