Google has recently released critical security patches addressing 62 vulnerabilities, two of which have been confirmed to be actively exploited in the wild. This update is part of Google’s ongoing commitment to enhancing the security of its software products and protecting users from potential threats.
Among the vulnerabilities patched, two are classified as high-severity, both carrying a CVSS score of 7.8. The details of these vulnerabilities are as follows:
CVE-2024-53150: This vulnerability is an out-of-bounds flaw in the USB sub-component of the Kernel, which could potentially lead to information disclosure. CVE-2024-53197: This is a privilege escalation flaw also found in the USB sub-component of the Kernel.Google emphasizes that the most critical of these issues resides in the System component, which could allow for remote escalation of privilege without requiring additional execution privileges. Notably, user interaction is not necessary for these vulnerabilities to be exploited.
Google has acknowledged that both vulnerabilities may have been subject to limited and targeted exploitation. It is important to highlight that CVE-2024-53197 is rooted in the Linux kernel and was previously patched last year, alongside two other vulnerabilities: CVE-2024-53104 and CVE-2024-50302.
According to reports from Amnesty International, these three vulnerabilities were reportedly chained together to facilitate a breach into the Android phone of a Serbian youth activist in December 2024. While CVE-2024-53104 was addressed by Google in February 2025, CVE-2024-50302 was remediated just last month. With the latest updates, all three vulnerabilities have now been effectively fixed, thereby closing the exploit path.
As of now, there are no detailed reports concerning how CVE-2024-53150 has been exploited in real-world attacks, including information on the perpetrators or the specific targets of these attacks. To enhance device security, users of Android devices are strongly advised to apply the updates as soon as they become available through their respective Android original equipment manufacturers (OEMs).
In summary, Google’s proactive measures in addressing these vulnerabilities are crucial for maintaining the security and integrity of Android devices. Staying informed and applying updates promptly can significantly reduce the risk of exploitation.