Google has warned {that a} security flaw impacting its Android working system has come underneath lively exploitation within the wild.
The vulnerability, tracked as CVE-2024-43093, has been described as a privilege escalation flaw within the Android Framework part that might lead to unauthorized entry to “Android/information,” “Android/obb,” and “Android/sandbox” directories and its sub-directories, in line with a code commit message.
There are presently no particulars about how the vulnerability is being weaponized in real-world assaults, however Google acknowledged in its month-to-month bulletin that there are indications it “could also be underneath restricted, focused exploitation.”
The tech big has additionally flagged CVE-2024-43047, a now-patched security bug in Qualcomm chipsets, as having been actively exploited. A use-after-free vulnerability within the Digital Sign Processor (DSP) Service, profitable exploitation might result in reminiscence corruption.
Final month, the chipmaker credited Google Venture Zero researchers Seth Jenkins and Conghui Wang for reporting the flaw, and Amnesty Worldwide Safety Lab for confirming the in-the-wild exercise.
The advisory gives no particulars on the exploit exercise focusing on the flaw or when it might need began, though it is doable that it might have been leveraged as a part of extremely focused adware assaults geared toward civil society members.
It is also presently not identified if each the security vulnerabilities have been normal collectively as an exploit chain to raise privileges and obtain code execution.
CVE-2024-43093 is the second actively exploited Android Framework flaw after CVE-2024-32896, which was patched by Google again in June and September 2024. Whereas it was initially resolved just for Pixel units, the corporate later confirmed that the flaw impacts the broader Android ecosystem.