Google has rolled out month-to-month safety patches for Android to handle quite a few flaws, together with a zero-day bug that it mentioned could have been exploited within the wild.
Tracked as CVE-2023-35674, the high-severity vulnerability is described as a case of privilege escalation impacting the Android Framework.
“There are indications that CVE-2023-35674 could also be beneath restricted, focused exploitation,” the corporate said in its Android Safety Bulletin for September 2023 with out delving into extra specifics.
The replace additionally addresses three different privilege escalation flaws in Framework, with the search big noting that probably the most extreme of those points “might result in native escalation of privilege with no extra execution privileges wanted” sans any consumer interplay.
Way Too Vulnerable: Uncovering the State of the Identity Attack Surface
Achieved MFA? PAM? Service account safety? Learn the way well-equipped your group actually is towards identification threats
Google mentioned it has additional plugged a essential safety vulnerability within the System part that might result in distant code execution with out requiring interplay on the a part of the sufferer.
“The severity evaluation is predicated on the impact that exploiting the vulnerability might have on an affected gadget, assuming the platform and repair mitigations are turned off for improvement functions or if efficiently bypassed,” it added.
In whole, Google has fastened 14 flaws within the System module and two shortcomings within the MediaProvider part, the latter of which will likely be delivered as a Google Play system replace.