TR | EN | DE | Our Site

October 2024 - Critical Security Vulnerabilities in Android Applications

 October 2024 - Critical Security Vulnerabilities in Android Applications


Recently, a series of security vulnerabilities were identified within the Android operating system and various applications, posing threats that could endanger user data, allow unauthorized access to devices, or expose sensitive information. Below is a summary of significant CVEs (Common Vulnerabilities and Exposures) published in October 2024:


CVE-2024-42041: Arbitrary JavaScript Code Execution in VideoDownload Application

Description: The VideoDownload application ("com.videodownload.browser.videodownloader" aka AppTool-Browser-Video All Video Downloader) allows attackers to execute arbitrary JavaScript code within the app, enabling malicious users to run harmful code.

Published Date: October 30, 2024

CVSS Score: (Not yet available)

Impact: Remote control through arbitrary code execution in vulnerable applications.



CVE-2024-37573: Phone Call Execution Vulnerability in Talkatone Application

Description: A security flaw in the Talkatone app allows any application to initiate a phone call without user interaction, enabling attackers to make unauthorized calls.

Published Date: October 30, 2024

CVSS Score: (Not yet available)

Impact: Unauthorized access to call functions, compromising phone security.



CVE-2024-47031: Privilege Escalation in Google Pixel Devices

Description: This vulnerability in pre-October 5, 2024, Android versions can cause privilege escalation in Google Pixel devices via the ABL component.

Published Date: October 25, 2024

CVSS Score: (Not yet available)

Impact: Privilege escalation allowing administrative-level control over the device.



CVE-2024-44100: Information Disclosure Vulnerability in Google Pixel Modem Component

Description: This vulnerability enables information leakage in the modem component of Google Pixel devices.

Published Date: October 25, 2024

CVSS Score: 7.5 (High)

Impact: Information leakage endangering user data.



CVE-2024-9302: Privilege Escalation in WordPress App Builder Plugin

Description: Due to weak password reset mechanisms, the App Builder plugin allows attackers to take over user accounts, enabling unauthorized password changes and control over accounts.

Published Date: October 25, 2024

CVSS Score: 9.8 (Critical)

Impact: Privilege escalation and takeover of user accounts.



CVE-2024-9956: Privilege Escalation in WebAuthentication on Google Chrome

Description: This vulnerability in the WebAuthentication component of Google Chrome’s Android version enables privilege escalation, allowing attackers to control the system.

Published Date: October 15, 2024

CVSS Score: (Not yet available)

Impact: Security breach through malicious websites and privilege escalation.



CVE-2024-34672: Improper Input Validation in SamsungVideoPlayer

Description: Flawed input validation in SamsungVideoPlayer allows local attackers to access video files belonging to other users.

Published Date: October 8, 2024

CVSS Score: (Not yet available)

Impact: Unauthorized access to user data due to improper input validation.



CVE-2024-9395: File Extension Hiding Vulnerability in Firefox for Android

Description: In Firefox’s Android version, a specially crafted file name can hide the extension of a downloaded file, misleading users into opening malicious files.

Published Date: October 1, 2024

CVSS Score: (Not yet available)

Impact: Hidden file extensions mislead users, exposing them to malware.



CVE-2024-9394: JavaScript Execution Vulnerability in Firefox for Android

Description: This vulnerability enables attackers to execute malicious JavaScript code in Firefox’s Android version through a specially crafted response, allowing cross-origin content access.

Published Date: October 1, 2024

CVSS Score: 7.5 (High)

Impact: JavaScript execution leading to data theft and security breaches.


These vulnerabilities highlight the need for heightened security awareness among Android users, especially when handling potentially malicious files or untrusted applications.



Aurora_Feniks

I have extensive experience working on various projects within the IT field, which has provided me with a comprehensive understanding of all areas related to information technology. My expertise in cyber security and my hands-on experience with current scenarios have given me a well-rounded perspective on security issues.

Post a Comment

Hello, share your thoughts with us.

Previous Post Next Post

İletişim Formu