Article Details

Scrape Timestamp (UTC): 2024-08-06 18:27:05.426

Source: https://www.theregister.com/2024/08/06/google_fixes_linux_kernal_rce/

Original Article Text

Click to Toggle View

Google splats device-hijacking exploited-in-the-wild Android kernel bug among others. And Qualcomm addresses 'permanent denial of service' flaw in its stuff. Google released 46 fixes for Android in its August security patch batch, including one for a Linux kernel flaw in the mobile OS that can lead to remote code execution (RCE). From the sounds of things, this hole already been spotted and exploited by spyware slingers. This bug, tracked as CVE-2024-36971, is a use-after-free vulnerability in the networking stack that earned a high-severity 7.8-out-of-10 CVSS rating. Successful exploitation may lead to "remote code execution with System execution privileges needed," the web giant said, meaning an attacker could gain full control over the device, potentially from across the network or internet. And while Google never provides much detail in its monthly patch bulletins about how Android flaws are being abused in the wild, it does note that "there are indications that CVE-2024-36971 may be under limited, targeted exploitation." Plus, Google Threat Analysis Group's Clément Lecigne gets credit for finding and reporting this vulnerability. This is significant because TAG tracks state-sponsored cyberspies and about 40 commercial surveillance vendors including Pegasus developer NSO Group and Predator maker Intellexa. In 2023, TAG uncovered 25 zero-day vulnerabilities under active exploitation, and 20 of these were abused by commercial surveillance vendors. So it's safe to assume that while this security alert says a flaw "may be" under exploit, it likely is already being used in spyware-spreading attacks against selected targets. If you haven't already, update any Android devices right away. While CVE-2024-36971 is certainly the most pressing of the Android updates, don't neglect the other fixes in this month's batch.  There's a critical flaw, tracked as CVE-2024-23350, in a Qualcomm closed-source component. According to Qualcomm's alert, this bug exists in the devices' multi-mode call processor. And can lead to permanent denial of service. Plus, Google addressed 11 high-severity elevation-of-privilege bugs in the Framework component that attackers can abuse without needing any additional execution privileges. August is another month in which Google issued two sets of patches. There's the 2024-08-01 patch level, which are Android-specific, and the 2024-08-05 patch level, which includes all of the earlier CVEs plus patches for Kernel and third-party components: Arm, Imagination Technologies, MediaTek, and Qualcomm, including that permanent one. This latter bunch affects other vendors' closed-source components and are described in more detail in the third-party vendor's respective security bulletins. And, of course, all of this is simply a preview to next week's August Patch Tuesday event, during which Microsoft and friends will push fixes for even more CVEs, so stay tuned for that.

Daily Brief Summary

NATION STATE ACTIVITY // Google Fixes Android Bug Exploited by Spyware Slingers

Google has released a security update addressing a critical Android kernel bug, CVE-2024-36971, which has been actively exploited in the wild.

The vulnerability, a use-after-free flaw in the networking stack, allows for remote code execution and could enable attackers to gain full control over affected devices.

This flaw has been pinpointed as potentially used by state-sponsored entities and commercial surveillance operators, indicating a higher risk of targeted spyware attacks.

The August security patch includes 46 fixes, with a particular emphasis on this severe vulnerability rated 7.8 on the CVSS scale.

Other notable fixes in the update include a critical Qualcomm component vulnerability, CVE-2024-23350, that could lead to a permanent denial of service.

Google's Threat Analysis Group, which tracks commercial surveillance vendors like NSO Group, identified the exploit, reflecting its potential use in highly targeted operations.

Android users are urged to update their devices immediately to safeguard against this and other vulnerabilities patched in the August security update.

This release precedes the major August Patch Tuesday event from Microsoft, indicating a busy period for cybersecurity professionals managing device and network integrity.