Article Details
Scrape Timestamp (UTC): 2025-03-04 11:41:55.667
Original Article Text
Click to Toggle View
Google fixes Android zero-day exploited by Serbian authorities . Google has released patches for 43 vulnerabilities in Android's March 2025 security update, including two zero-days exploited in targeted attacks. Serbian authorities have used one of the zero-days, a high-severity information disclosure security vulnerability (CVE-2024-50302) in the Linux kernel's driver for Human Interface Devices, to unlock confiscated devices. The flaw was reportedly exploited as part of an Android zero-day exploit chain developed by Israeli digital forensics company Cellebrite to unlock confiscated devices. The exploit chain—which also includes a USB Video Class zero-day (CVE-2024-53104) patched last month and an ALSA USB-sound driver zero-day)—was found by Amnesty International's Security Lab in mid-2024 while analyzing the logs found on a device unlocked by Serbian authorities. Google told BleepingComputer last week that they shared fixes for these flaws with OEM partners in January. "We were aware of these vulnerabilities and exploitation risk prior to these reports and promptly developed fixes for Android. Fixes were shared with OEM partners in a partner advisory on January 18," a Google spokesperson told BleepingComputer. The second zero-day fixed this month (CVE-2024-43093) is an Android Framework privilege escalation vulnerability that allows local attackers to access sensitive directories due to incorrect unicode normalization by exploiting a file path filter bypass without additional execution privileges or user interaction. This month's Android security updates also address 11 vulnerabilities that can let attackers gain remote code execution on vulnerable devices. Google has issued two sets of security patches, the 2025-03-01 and 2025-03-01 security patch levels. The latter comes with all fixes from the first batch and patches for closed-source third-party and kernel subcomponents, which may not apply to all Android devices. Google Pixel devices receive the updates immediately, while other vendors will often take longer to test and fine-tune the security patches for their hardware configurations. Manufacturers can also prioritize the earlier patch set for quicker updates, which does not necessarily indicate increased exploitation risk. In November, the company patched two more Android zero-day (CVE-2024-43047 and CVE-2024-43093), which were also tagged as exploited in limited, targeted attacks. CVE-2024-43047 was first tagged as exploited by Google Project Zero in October 2024. The Serbian government used it in NoviSpy spyware attacks targeting the Android devices of activists, journalists, and protestors.
Daily Brief Summary
Google released patches for 43 Android security vulnerabilities in its March 2025 update, which includes remedies for two exploited zero-days.
Serbian authorities used a zero-day vulnerability, CVE-2024-50302, to unlock confiscated devices. This flaw resides in the Linux kernel driver for Human Interface Devices.
The exploit was developed by Israeli company Cellebrite as part of a zero-day chain also involving other vulnerabilities in USB functionalities.
Amnesty International's Security Lab discovered the exploitation through device log analysis from a device unlocked by Serbian officials.
Google has fixed another serious zero-day (CVE-2024-43093), which allows privilege escalation in Android Framework without user interaction.
The latest security update also addresses 11 vulnerabilities allowing remote code execution on affected devices.
Google has provided these security updates directly to OEM partners for implementation, with Google Pixel devices receiving immediate updates. Other manufacturers may have varying update schedules.
Prior security updates in November also tackled two zero-days, with one (CVE-2024-43047) being used in spyware attacks targeted at activists and journalists by Serbian government.