New Delhi: The Indian Computer Emergency Response Team (CERT-In) has issued a fresh high-risk alert for Android users, with a particular focus on those using the latest Android 15 version. The central
New Delhi: The Indian Computer Emergency Response Team (CERT-In) has issued a fresh high-risk alert for Android users, with a particular focus on those using the latest Android 15 version. The central agency stated that multiple vulnerabilities have been reported in Android, which could be exploited by an attacker to obtain sensitive information, gain elevated privileges, execute arbitrary code or cause denial of service (DoS) condition on the targeted system.
“Multiple vulnerabilities have been reported in Android, which could be exploited by an attacker to obtain sensitive information, gain elevated privileges, execute arbitrary code or cause denial of service (DoS) condition on the targeted system,” CERT-In in a press release said.
- Android versions 12
- Android versions 12L
- Android versions 13
- Android versions 14
- Android versions 15
CERT-In has published Vulnerability notes on its website (25-11-2024)
Multiple Vulnerabilities in Androidhttps://t.co/ik8DtXDeqC
Multiple Vulnerabilities in Intel Productshttps://t.co/sNQ9QX29BO
Multiple Vulnerabilities in Fortinet Productshttps://t.co/pDIFUXJzVG— CERT-In (@IndianCERT) November 26, 2024
- Target Audience: All OEMs and users of Android.
- Risk Assessment: High risk of unauthorized access of data and system instability.
- Impact Assessment: Potential for data breaches, or system crash.
Android is an open-source operating system primarily designed for mobile devices, including smartphones, tablets, smartwatches, and other embedded systems, reads CERT-In.
Multiple vulnerabilities exist in Android due to flaws in the Framework, System, Google Play system updates, Kernel, Kernel LTS, Imagination Technologies, MediaTek components, Qualcomm components and Qualcomm closed-source components.
Successful exploitation of these vulnerabilities could allow an attacker to obtain sensitive information, gain elevated privileges, execute arbitrary code or cause denial of service (DoS) condition on the targeted system.
Topics