Home Cyber Security Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies

Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies

0
Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies
Android Zero-Day Flaw

Google has disclosed that two Android safety flaws impacting its Pixel smartphones have been exploited within the wild by forensic corporations.

The high-severity zero-day vulnerabilities are as follows –

  • CVE-2024-29745 – An info disclosure flaw within the bootloader element
  • CVE-2024-29748 – A privilege escalation flaw within the firmware element

“There are indications that the [vulnerabilities] could also be underneath restricted, focused exploitation,” Google mentioned in an advisory revealed April 2, 2024.

Whereas the tech large didn’t reveal every other details about the character of the assaults exploiting these shortcomings, the maintainers of GrapheneOS mentioned they “are being actively exploited within the wild by forensic corporations.”

Cybersecurity

“CVE-2024-29745 refers to a vulnerability within the fastboot firmware used to assist unlocking/flashing/locking,” they mentioned in a sequence of posts on X (previously Twitter).

“Forensic corporations are rebooting units in After First Unlock state into fastboot mode on Pixels and different units to take advantage of vulnerabilities there after which dump reminiscence.”

GrapheneOS famous that CVE-2024-29748 may very well be weaponized by native attackers to interrupt a manufacturing facility reset triggered by way of the system admin API.

The disclosure comes greater than two months after the GrapheneOS group revealed that forensic corporations are exploiting firmware vulnerabilities that influence Google Pixel and Samsung Galaxy telephones to steal information and spy on customers when the system is just not at relaxation.

It additionally urged Google to introduce an auto-reboot characteristic to make exploitation of firmware flaws tougher.

LEAVE A REPLY

Please enter your comment!
Please enter your name here