Android

The February 2025 Android security updates patch 48 vulnerabilities, including a zero-day kernel vulnerability that has been exploited in the wild.

This high-severity zero-day (tracked as CVE-2024-53104) is a privilege escalation security flaw in the Android Kernel's USB Video Class driver that allows authenticated local threat actors to elevate privileges in low-complexity attacks.

The issue occurs because the driver does not accurately parse frames of the type UVC_VS_UNDEFINED within the uvc_parse_format function. As a result, the frame buffer size is miscalculated, leading to potential out-of-bounds writes that can be exploited in arbitrary code execution or denial-of-service attacks.

Wiz

In addition to this actively exploited zero-day bug, the February 2025 Android security updates also fix a critical security flaw in Qualcomm's WLAN component.

Qualcomm describes this critical flaw (CVE-2024-45569) as a firmware memory corruption issue caused by an Improper Validation of Array Index weakness in WLAN host communication when parsing the ML IE due to invalid frame content.

CVE-2024-45569 can be exploited by remote attackers to potentially execute arbitrary code or commands, read or modify memory, and trigger crashes in low-complexity attacks that don't require privileges or user interaction.

Android security patch levels

Google released two sets of patches for February 2025, the 2025-02-01 and 2025-02-05 security patch levels. The latter includes all fixes from the first batch and additional patches for closed-source third-party and kernel elements, which may not apply to all Android devices.

Vendors may prioritize the earlier patch set for quicker updates, which does not necessarily indicate increased exploitation risk.

Google Pixel devices will receive updates immediately, while other manufacturers often take longer to test and fine-tune the security patches for various hardware configurations.

In November, Google fixed two more actively exploited Android zero-days (CVE-2024-43047 and CVE-2024-43093), also tagged as exploited in limited, targeted attacks.

CVE-2024-43047 was first marked as actively exploited by Google Project Zero in October 2024. The Serbian government also exploited it in NoviSpy spyware attacks to compromise the Android devices of activists, journalists, and protestors.

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.

Related Articles:

Google fixes two Android zero days exploited in attacks, 107 flaws

Sonicwall warns of new SMA1000 zero-day exploited in attacks

CISA: High-severity Linux flaw now exploited by ransomware gangs

Cisco warns of unpatched AsyncOS zero-day exploited in attacks

New Windows zero-day exploited by 11 state hacking groups since 2017