

{"id":313,"date":"2025-02-05T00:01:17","date_gmt":"2025-02-04T18:31:17","guid":{"rendered":"https:\/\/www.securis360.com\/blog\/?p=313"},"modified":"2026-02-18T05:43:48","modified_gmt":"2026-02-18T05:43:48","slug":"google-patches-android-kernel-zero-day-exploited-in-active-attacks","status":"publish","type":"post","link":"https:\/\/securis360.com\/blog\/google-patches-android-kernel-zero-day-exploited-in-active-attacks\/","title":{"rendered":"Google Patches Android Kernel Zero-Day Exploited in Active Attacks"},"content":{"rendered":"\n<p>The <strong>February 2025 Android security update<\/strong> addresses <strong>48 vulnerabilities<\/strong>, including a <strong>zero-day kernel flaw<\/strong> that has been actively exploited in real-world attacks.<\/p>\n\n\n\n<p>This <strong>high-severity vulnerability<\/strong> (<strong>CVE-2024-53104<\/strong>) is a <strong>privilege escalation bug<\/strong> found in the <strong>USB Video Class (UVC) driver<\/strong> of the <strong>Android Kernel<\/strong>. It allows <strong>authenticated local attackers<\/strong> to <strong>gain elevated privileges<\/strong> through a <strong>low-complexity exploit<\/strong>.<\/p>\n\n\n\n<p>The root cause of this flaw lies in the <strong>improper parsing of UVC_VS_UNDEFINED frame types<\/strong> within the <strong>uvc_parse_format function<\/strong>. Due to an incorrect <strong>frame buffer size calculation<\/strong>, attackers can trigger <strong>out-of-bounds writes<\/strong>, leading to <strong>arbitrary code execution<\/strong> or <strong>denial-of-service (DoS) attacks<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Additional Security Fixes in February 2025 Update<\/strong><\/h3>\n\n\n\n<p>Beyond this <strong>actively exploited zero-day<\/strong>, the latest Android security patches also address a <strong>critical vulnerability<\/strong> affecting <strong>Qualcomm\u2019s WLAN component<\/strong>.<\/p>\n\n\n\n<p>Tracked as <strong>CVE-2024-45569<\/strong>, this flaw stems from <strong>firmware memory corruption<\/strong> caused by an <strong>improper array index validation<\/strong> when parsing <strong>ML IE frame content<\/strong>.<\/p>\n\n\n\n<p>Exploiting <strong>CVE-2024-45569<\/strong> allows <strong>remote attackers<\/strong> to execute arbitrary code, modify memory, or crash affected systems\u2014<strong>all without requiring user interaction or elevated privileges<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Android Security Patch Levels &amp; Device Updates<\/strong><\/h3>\n\n\n\n<p>Google has rolled out <strong>two patch levels<\/strong> for February 2025:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>2025-02-01:<\/strong> Includes core security updates.<\/li>\n\n\n\n<li><strong>2025-02-05:<\/strong> Builds on the first patch set and adds fixes for <strong>closed-source kernel and third-party components<\/strong> (relevant to specific devices).<\/li>\n<\/ul>\n\n\n\n<p>While some manufacturers may push out the <strong>initial patch set<\/strong> first for <strong>faster deployment<\/strong>, this does not necessarily indicate a <strong>higher exploitation risk<\/strong>.<\/p>\n\n\n\n<p>Google <strong>Pixel devices<\/strong> receive security updates <strong>immediately<\/strong>, whereas other manufacturers may take longer to <strong>test and optimize patches<\/strong> for different hardware configurations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Past Exploited Android Zero-Days<\/strong><\/h3>\n\n\n\n<p>In <strong>November 2024<\/strong>, Google addressed <strong>two more actively exploited vulnerabilities<\/strong> (<strong>CVE-2024-43047<\/strong> and <strong>CVE-2024-43093<\/strong>), both leveraged in <strong>targeted cyberattacks<\/strong>.<\/p>\n\n\n\n<p>Google\u2019s <strong>Project Zero<\/strong> flagged <strong>CVE-2024-43047<\/strong> as <strong>actively exploited in October 2024<\/strong>. Reports later revealed that it was weaponized by the <strong>Serbian government<\/strong> in <strong>NoviSpy spyware<\/strong> operations, targeting <strong>activists, journalists, and protestors<\/strong> through compromised Android devices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The February 2025 Android security update addresses 48 vulnerabilities, including a zero-day kernel flaw that has been actively exploited in real-world attacks. This high-severity vulnerability (CVE-2024-53104) is a privilege escalation bug found in the USB Video Class (UVC) driver of the Android Kernel. It allows authenticated local attackers to gain elevated privileges through a low-complexity [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":933,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[15,16,17,36,24],"class_list":["post-313","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-cybercrime","tag-cybersecurity","tag-data-protection","tag-information-security","tag-scam-awareness"],"_links":{"self":[{"href":"https:\/\/securis360.com\/blog\/wp-json\/wp\/v2\/posts\/313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securis360.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securis360.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securis360.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securis360.com\/blog\/wp-json\/wp\/v2\/comments?post=313"}],"version-history":[{"count":1,"href":"https:\/\/securis360.com\/blog\/wp-json\/wp\/v2\/posts\/313\/revisions"}],"predecessor-version":[{"id":935,"href":"https:\/\/securis360.com\/blog\/wp-json\/wp\/v2\/posts\/313\/revisions\/935"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securis360.com\/blog\/wp-json\/wp\/v2\/media\/933"}],"wp:attachment":[{"href":"https:\/\/securis360.com\/blog\/wp-json\/wp\/v2\/media?parent=313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securis360.com\/blog\/wp-json\/wp\/v2\/categories?post=313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securis360.com\/blog\/wp-json\/wp\/v2\/tags?post=313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}