Published: March 4, 2025
Severity: High (CVSS 8.0)
Impacted Products: Multiple Android Devices
Google's March 2025 Android Security Bulletin brings to light 44 vulnerabilities affecting various Android components. Notably, two of these—CVE-2024-43093 and CVE-2024-50302—are currently under active exploitation, underscoring the urgency for users and administrators to address these issues promptly.
Description: This vulnerability allows unauthorized access to directories such as "Android/data," "Android/obb," and "Android/sandbox," potentially exposing sensitive data.
Severity: High
Impact: Attackers can exploit this flaw to access restricted directories, leading to potential data leakage or further system compromise.
Exploitation: Google has observed active exploitation of this vulnerability in targeted attacks.
Description: A flaw in the HID USB component of the Linux kernel that could lead to a leak of uninitialized kernel memory to a local attacker through specially crafted HID reports.
Severity: High
Impact: Local attackers could exploit this vulnerability to access uninitialized kernel memory, potentially exposing sensitive information.
Exploitation: This vulnerability has been detected under active exploitation in limited, targeted scenarios.
To protect against these vulnerabilities:
Update Devices Promptly: Ensure all Android devices are updated to the latest security patch level (2025-03-05 or later).
Verify Patch Installation: After updating, confirm that the device's security patch level reflects the 2025-03-05 update.
Exercise Caution with Unknown Sources: Avoid installing applications from untrusted sources, as they may exploit these vulnerabilities.
Enable Google Play Protect: Keep Google Play Protect active to detect and prevent the installation of malicious apps.
The active exploitation of these vulnerabilities highlights the critical importance of timely security updates. Devices running outdated software are at heightened risk of compromise, potentially leading to data breaches and unauthorized access. Organizations must prioritize mobile device security within their broader cybersecurity strategies to mitigate such risks effectively.
Gradient Cyber offers comprehensive services to help organizations assess and enhance their mobile security posture. Our experts are ready to assist with vulnerability assessments, patch management strategies, and incident response planning.