Topics

later

AI

Amazon

Article image

Image Credits:David Paul Morris/Bloomberg / Getty Images

Apps

Biotech & Health

mood

Cloud Computing

Commerce

Crypto

go-ahead

EVs

Fintech

Fundraising

convenience

game

Google

Government & Policy

Hardware

Instagram

Layoffs

Media & Entertainment

Meta

Microsoft

concealment

Robotics

Security

Social

Space

Startups

TikTok

Transportation

Venture

More from TechCrunch

Events

Startup Battlefield

StrictlyVC

Podcasts

Videos

Partner Content

TechCrunch Brand Studio

Crunchboard

adjoin Us

On Monday , Google released an update for Androidthat fixes two zero - day flaw that “ may be under limited , targeted exploitation , ” as the company put it . That think of Google is cognizant that hackers have been and may still be using the bugs to compromise Android devices in real - world scenarios .

One of the two now - fixed zero - mean solar day , track asCVE-2024 - 53197 , was key out by Amnesty International in collaboration with Benoît Sevens of Google ’s Threat Analysis Group , the tech giant ’s security squad that tracks government - backed cyberattacks .

In February , Amnesty enjoin it had find that Cellebrite , a party that sells devices to legal philosophy enforcement for unlocking and forensically canvas phone , was involve reward of a chain of threezero - twenty-four hours vulnerabilitiesto hack into Android phones .

In this typeface , Amnesty find oneself the vulnerabilities , including the one patched on Monday , being used against a Serbian student activistby local authorities armed with Cellebrite .

There is n’t a lot of information , however , on the second vulnerability , CVE-2024 - 53150 , patched on Monday , other than the fact that its discovery was also credited to Google ’s Sevens and that the fault wasfound in the kernel , the core of an operating system .

Google did not immediately respond to a request for comment .

Amnesty spokesperson Hajira Maryam say the non - profits did not have anything to share at this point .

Join us at TechCrunch Sessions: AI

Exhibit at TechCrunch Sessions: AI

The tech behemoth said in its advisory that “ the most spartan of these issue is a critical security exposure in the System component that could take to remote escalation of perquisite with no additional execution exclusive right needed , ” and that , “ user fundamental interaction is not needed for victimization . ”

Google tell that it would push source code plot of land for the two fixed zero - days within 48 hours of the advisory , while also noting that Android partners are “ notified of all issues at least a month before publication . ”

Given Android ’s undefended beginning nature , every speech sound manufacturer now has to push patches out to their own users .

This story was update to admit Amnesty ’s response .