securityonline.info Open in urlscan Pro
54.151.156.30  Public Scan

URL: https://securityonline.info/cve-2024-0031-critical-android-code-execution-vulnerability/
Submission: On March 13 via manual from SG — Scanned from SG

Form analysis 3 forms found in the DOM

https://securityonline.info/

<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" name="s"></label>
  <input type="submit" class="search-submit" value="Search">
</form>

https://securityonline.info/

<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" name="s"></label>
  <input type="submit" class="search-submit" value="Search">
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr class="alt">
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url(&quot;https://www.google.com/cse/static/images/1x/en/branding.png&quot;) left center no-repeat rgb(255, 255, 255); outline: none;"
                      dir="ltr" spellcheck="false"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" style="display: none;" title="Clear search box" role="button"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Skip to content

Penetration Testing


 * Search for:

 * Home
 * Forensics
 * Machine Learning
 * Malware Analysis
 * Networking
 * Network PenTest
   * Information Gathering
   * Vulnerability Analysis
   * Exploitation
     * Metasploit
   * Post Exploitation
   * Maintaining Access
   * Password Attacks
   * Sniffing & Spoofing
   * Smartphone PenTest
   * Wireless
 * News
   * Cyber Security
   * Data Leak
   * Malware
   * Technology
   * Vulnerability
 * Reverse Engineering
 * Technique
 * Web PenTest
   * Web Information Gathering
   * Web Vulnerability Analysis
   * Web Exploitation
   * Web Maintaining Access
   * Reporting

 * Home
 * Forensics
 * Machine Learning
 * Malware Analysis
 * Networking
 * Network PenTest
   * Information Gathering
   * Vulnerability Analysis
   * Exploitation
     * Metasploit
   * Post Exploitation
   * Maintaining Access
   * Password Attacks
   * Sniffing & Spoofing
   * Smartphone PenTest
   * Wireless
 * News
   * Cyber Security
   * Data Leak
   * Malware
   * Technology
   * Vulnerability
 * Reverse Engineering
 * Technique
 * Web PenTest
   * Web Information Gathering
   * Web Vulnerability Analysis
   * Web Exploitation
   * Web Maintaining Access
   * Reporting

Search for:

Penetration Testing


 * Vulnerability


CVE-2024-0031: CRITICAL ANDROID REMOTE CODE EXECUTION VULNERABILITY

by do son · Published February 5, 2024 · Updated February 5, 2024



Google, a titan in the digital realm, has once again demonstrated its commitment
to user security with the release of its February 2024 security updates for
Android. This latest security bulletin brings to the forefront the ongoing
battle against cyber threats, patching a total of 46 vulnerabilities, including
a critical-severity remote code execution (RCE) flaw that poses a significant
risk to millions worldwide.


iOS 16.0 - 16.3 JAILBREAK News: New...


Please enable JavaScript




Video Player is loading.
Play Video
PlaySkip Backward
Unmute

Current Time 0:00
/
Duration 2:36
0:00


Stream Type LIVE
Seek to live, currently behind liveLIVE
Remaining Time -2:36
 
1x
Playback Rate
 * 2x
 * 1.5x
 * 1x, selected
 * 0.5x

Chapters
 * Chapters

Descriptions
 * descriptions off, selected

Captions
 * captions settings, opens captions settings dialog
 * captions off, selected
 * American English Captions

Audio Track
 * en, selected

Auto(360pLQ)

ShareFullscreen

This is a modal window.



Beginning of dialog window. Escape will cancel and close the window.

TextColorWhiteBlackRedGreenBlueYellowMagentaCyanOpacityOpaqueSemi-TransparentText
BackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanOpacityOpaqueSemi-TransparentTransparentCaption
Area
BackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanOpacityTransparentSemi-TransparentOpaque
Font Size50%75%100%125%150%175%200%300%400%Text Edge
StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional
Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall
Caps
Reset restore all settings to the default valuesDone
Close Modal Dialog

End of dialog window.





iOS 16.0 - 16.3 JAILBREAK News: New Kernel Vuln by PANGU / P0! Could Be Useful
For Jailbreak (A12+)

At the heart of this month’s security bulletin is a critical vulnerability
affecting Android Systems running versions 11 through 14. Identified as
CVE-2024-0031, this flaw stands out for its potential to allow attackers to
execute malicious code remotely on a victim’s device without requiring any
additional permissions.



“The most severe of these issues is a critical security vulnerability in the
System component that could lead to remote code execution with no additional
execution privileges needed,” reads the security bulletin.

Google released fixes across two separate security patch levels: 2024-02-01 and
2024-02-05. The initial batch addresses 15 vulnerabilities in core Android
components such as the Framework and System, with the critical RCE flaw taking
the spotlight for its potential impact on user security.

The subsequent patch level, 2024-02-05, focuses on shoring up defenses in
third-party vendor components from industry giants like Arm, MediaTek, Unisoc,
and Qualcomm.

Beyond the critical CVE-2024-0031 RCE vulnerability, the February 2024 updates
tackle an array of high-severity issues, ranging from escalation of privilege,
information disclosure, to denial of service problems. Google’s decision to
withhold detailed information about these vulnerabilities underscores a
proactive strategy to prevent active exploitation, giving users across the globe
ample time to secure their devices.

Google has made applying these critical updates straightforward for Android
users. By navigating to Settings → System → System Update, users can quickly
check for and apply the latest security patches.


Share







Tags: androidCVE-2024-0031

 * Next story Canon Warns of Critical Vulnerabilities in Printers: RCE & DoS
   Attacks
 * Previous story Behind the Mask: Dissecting the Latest VBA Script Cyber
   Espionage



Follow:

 * 
 * 
 * 
 * 
 * 
 * 


SEARCH

×

search
 

The Best VPS Service

 * Popular Posts
 * Tags

 * Vulnerability
   
   CVE-2024-21320 PoC Published- How Microsoft Themes Can Compromise Your
   Credentials
   
   March 6, 2024

 * Cyber Security
   
   Iran’s Cyber Blitz: From Chaos to Influence in the Israel-Hamas Conflict
   
   February 7, 2024

 * Technique
   
   The Role of Observability in Microservice Security
   
   February 7, 2024

 * Malware
   
   XPhase Clipper: The Global Crypto Scam Unveiled by CRIL
   
   February 7, 2024

 * Vulnerability
   
   PoC Releases for Oracle WebLogic Server Servers RCE Flaw (CVE-2024-20931)
   
   February 7, 2024

 * active directory android Apple backdoor BurpSuite chrome CISA cisco
   cyberattack Data Breach facebook gitlab google google chrome hacker kali
   linux Linux Linux Kernel malware metasploit Microsoft nmap OSINT penetration
   testing Pentesting PoC powershell privilege escalation Python ransomware
   shodan sqli sql injection sqlmap ssh Ubuntu vmware Vulnerability web app
   webapp pentest webshell windows wireless wordpress XSS



Reward


BRILLIANTLY

SAFE!




securityonline.info


CONTENT & LINKS

Verified by Sur.ly



2022


WEBSITE

 1. About SecurityOnline.info
 2. Advertise on SecurityOnline.info
 3. Contact



 * About Us
 * Contact Us
 * Disclaimer
 * Privacy Policy
 * DMCA NOTICE

Penetration Testing © 2024. All Rights Reserved.

 * 
 * 
 * 
 * 
 * 
 * 



x

x