News

Critical vulnerability CVE-2024-43093 threatens the security of Android users

Critical vulnerability CVE-2024-43093 threatens the security of Android users

Citizen Sec

@CitizenSec , 05-11-2024

News
#Critical vulnerability
#Information Security
Critical vulnerability CVE-2024-43093 threatens the security of Android users

Google has reported a serious vulnerability in the Android operating system, which is actively used by hackers. This problem allows hackers to gain unauthorized access to important Android system folders. The vulnerability received the code CVE-2024-43093 and is associated with the Android Framework — this is the part of the system responsible for the operation of applications.


Although the exact details of the attacks are unknown, Google warns that they may be aimed at certain types of users. The company also points to another security issue with the CVE-2024-43047 code related to Qualcomm processors, which has already been fixed. This vulnerability could lead to failures in the device's memory.


Researchers from Google Project Zero were the first to discover these problems, and Amnesty International confirmed their active use in real attacks. There is no information yet on how and when these vulnerabilities began to be exploited, but it is assumed that they could have been part of sophisticated espionage attacks on civil society activists.


To protect yourself from these threats, it is important to keep an eye on security updates on your device. Install all Android system and app updates regularly through the official Google Play store. This will help close possible vulnerabilities and reduce the risk of attacks.


You will be interested

News
#Information Security
#Critical vulnerability

Zebo-0.1.0 and Cometlogger-0.1: Dangerous Programs Stealing Data and Controlling Computers

Experts have discovered two dangerous programs that seem harmless at first. These programs can steal personal data, monitor computer activity, and even take control of the system.

@CitizenSec

26-12-2024
News
#Critical vulnerability
#Information Security

Microsoft Copilot Studio Vulnerability

This vulnerability, known as SSRF (server-side request forgery), could allow attackers to gain access to confidential data.

@CitizenSec

09-09-2024
News
#Information Security
#Critical vulnerability

Unpatched vulnerability in AVTECH cameras: hackers are taking over devices to create botnets.

Serious vulnerabilities have been discovered in AVTECH surveillance cameras, which malicious actors use to infect devices with malware.

@CitizenSec

05-09-2024
News
#Information Security
#Critical vulnerability

The vulnerability of the LiteSpeed Cache plugin threatens over 5 million WordPress sites

Recently, security researcher John Blackburn from PatchStack discovered a serious vulnerability in the LiteSpeed Cache plugin, which is used to speed up WordPress sites.

@CitizenSec

28-08-2024
News
#Information Security
#Critical vulnerability

Google warns: vulnerability CVE-2024-7965 in Chrome is under active exploitation

Google has reported a security issue in its Chrome browser that has been fixed in the latest update.

@CitizenSec

27-08-2024
News
#Information Security
#Critical vulnerability

Critical Vulnerability in OpenSSH on FreeBSD

A serious security vulnerability was recently discovered in OpenSSH on FreeBSD systems.

@CitizenSec

14-08-2024
News
#Information Security
#Critical vulnerability

Vulnerability in MongoDB Allows Attackers to Gain Full Control of Windows Systems

A critical vulnerability has been discovered in MongoDB, identified as CVE-2024-7553.

@CitizenSec

12-08-2024
News
#Information Security
#Critical vulnerability

Анализ вредоносного кода в бэкдоре XZ Utils - как хакеры эксплуатируют популярный архиватор для атак

В конце марта в популярной библиотеке XZ Utils был обнаружен бэкдор, который получил идентификатор CVE-2024-3094.

@CitizenSec

16-07-2024
News
#Information Security
#Critical vulnerability

Уязвимость в роутерах D-LINK

Найдена серьезная уязвимость в маршрутизаторах D-LINK, которая может раскрыть конфиденциальную информацию, такую как пароли. Уязвимость была выявлена и представлена в виде доказательства концепции (PoC).

@CitizenSec

11-07-2024