Google has launched its month-to-month Android Safety Bulletin for March 2025 to handle a complete of 44 vulnerabilities, together with two that it mentioned have come underneath energetic exploitation within the wild.
The 2 high-severity vulnerabilities are listed under –
- CVE-2024-43093 – A privilege escalation flaw within the Framework part that would lead to unauthorized entry to “Android/knowledge,” “Android/obb,” and “Android/sandbox” directories, and their respective sub-directories.
- CVE-2024-50302 – A privilege escalation flaw within the HID USB part of the Linux kernel that would result in a leak of uninitialized kernel reminiscence to a neighborhood attacker via specifically crafted HID studies.
It is value noting that CVE-2024-43093 was beforehand flagged by Google in its security advisory for November 2024 as actively exploited within the wild. It is not clear what prompted the tech big to concern the alert a second time.

The Hacker Information has reached out to Google for additional remark, and we are going to replace the story if we hear again.
CVE-2024-50302, then again, is among the three vulnerabilities that have been chained right into a zero-day exploit devised by Cellebrite to interrupt right into a Serbian youth activist’s Android cellphone in December 2024.
The exploit concerned the usage of CVE-2024-53104, CVE-2024-53197, and CVE-2024-50302 to achieve elevated privileges and sure deploy an Android spy ware dubbed NoviSpy.
All three vulnerabilities reside within the Linux kernel and have been patched late final 12 months. CVE-2024-53104 was addressed by Google in Android final month.
In its advisory, Google acknowledged that each CVE-2024-43093 and CVE-2024-50302 have come underneath “restricted, focused exploitation.”
The Mountain View-based firm has launched two security patch ranges, 2025-03-01 and 2025-03-05, in order to present flexibility to Android companions to handle a portion of vulnerabilities which might be related throughout all Android gadgets extra rapidly.