securityonline.info
Open in
urlscan Pro
54.151.156.30
Public Scan
URL:
https://securityonline.info/cve-2024-0031-critical-android-code-execution-vulnerability/
Submission: On March 13 via manual from SG — Scanned from SG
Submission: On March 13 via manual from SG — Scanned from SG
Form analysis
3 forms found in the DOMhttps://securityonline.info/
<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" name="s"></label>
<input type="submit" class="search-submit" value="Search">
</form>
https://securityonline.info/
<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" name="s"></label>
<input type="submit" class="search-submit" value="Search">
</form>
<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr class="alt">
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url("https://www.google.com/cse/static/images/1x/en/branding.png") left center no-repeat rgb(255, 255, 255); outline: none;"
dir="ltr" spellcheck="false"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" style="display: none;" title="Clear search box" role="button"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
Skip to content Penetration Testing * Search for: * Home * Forensics * Machine Learning * Malware Analysis * Networking * Network PenTest * Information Gathering * Vulnerability Analysis * Exploitation * Metasploit * Post Exploitation * Maintaining Access * Password Attacks * Sniffing & Spoofing * Smartphone PenTest * Wireless * News * Cyber Security * Data Leak * Malware * Technology * Vulnerability * Reverse Engineering * Technique * Web PenTest * Web Information Gathering * Web Vulnerability Analysis * Web Exploitation * Web Maintaining Access * Reporting * Home * Forensics * Machine Learning * Malware Analysis * Networking * Network PenTest * Information Gathering * Vulnerability Analysis * Exploitation * Metasploit * Post Exploitation * Maintaining Access * Password Attacks * Sniffing & Spoofing * Smartphone PenTest * Wireless * News * Cyber Security * Data Leak * Malware * Technology * Vulnerability * Reverse Engineering * Technique * Web PenTest * Web Information Gathering * Web Vulnerability Analysis * Web Exploitation * Web Maintaining Access * Reporting Search for: Penetration Testing * Vulnerability CVE-2024-0031: CRITICAL ANDROID REMOTE CODE EXECUTION VULNERABILITY by do son · Published February 5, 2024 · Updated February 5, 2024 Google, a titan in the digital realm, has once again demonstrated its commitment to user security with the release of its February 2024 security updates for Android. This latest security bulletin brings to the forefront the ongoing battle against cyber threats, patching a total of 46 vulnerabilities, including a critical-severity remote code execution (RCE) flaw that poses a significant risk to millions worldwide. iOS 16.0 - 16.3 JAILBREAK News: New... Please enable JavaScript Video Player is loading. Play Video PlaySkip Backward Unmute Current Time 0:00 / Duration 2:36 0:00 Stream Type LIVE Seek to live, currently behind liveLIVE Remaining Time -2:36 1x Playback Rate * 2x * 1.5x * 1x, selected * 0.5x Chapters * Chapters Descriptions * descriptions off, selected Captions * captions settings, opens captions settings dialog * captions off, selected * American English Captions Audio Track * en, selected Auto(360pLQ) ShareFullscreen This is a modal window. Beginning of dialog window. Escape will cancel and close the window. TextColorWhiteBlackRedGreenBlueYellowMagentaCyanOpacityOpaqueSemi-TransparentText BackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanOpacityOpaqueSemi-TransparentTransparentCaption Area BackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanOpacityTransparentSemi-TransparentOpaque Font Size50%75%100%125%150%175%200%300%400%Text Edge StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall Caps Reset restore all settings to the default valuesDone Close Modal Dialog End of dialog window. iOS 16.0 - 16.3 JAILBREAK News: New Kernel Vuln by PANGU / P0! Could Be Useful For Jailbreak (A12+) At the heart of this month’s security bulletin is a critical vulnerability affecting Android Systems running versions 11 through 14. Identified as CVE-2024-0031, this flaw stands out for its potential to allow attackers to execute malicious code remotely on a victim’s device without requiring any additional permissions. “The most severe of these issues is a critical security vulnerability in the System component that could lead to remote code execution with no additional execution privileges needed,” reads the security bulletin. Google released fixes across two separate security patch levels: 2024-02-01 and 2024-02-05. The initial batch addresses 15 vulnerabilities in core Android components such as the Framework and System, with the critical RCE flaw taking the spotlight for its potential impact on user security. The subsequent patch level, 2024-02-05, focuses on shoring up defenses in third-party vendor components from industry giants like Arm, MediaTek, Unisoc, and Qualcomm. Beyond the critical CVE-2024-0031 RCE vulnerability, the February 2024 updates tackle an array of high-severity issues, ranging from escalation of privilege, information disclosure, to denial of service problems. Google’s decision to withhold detailed information about these vulnerabilities underscores a proactive strategy to prevent active exploitation, giving users across the globe ample time to secure their devices. Google has made applying these critical updates straightforward for Android users. By navigating to Settings → System → System Update, users can quickly check for and apply the latest security patches. Share Tags: androidCVE-2024-0031 * Next story Canon Warns of Critical Vulnerabilities in Printers: RCE & DoS Attacks * Previous story Behind the Mask: Dissecting the Latest VBA Script Cyber Espionage Follow: * * * * * * SEARCH × search The Best VPS Service * Popular Posts * Tags * Vulnerability CVE-2024-21320 PoC Published- How Microsoft Themes Can Compromise Your Credentials March 6, 2024 * Cyber Security Iran’s Cyber Blitz: From Chaos to Influence in the Israel-Hamas Conflict February 7, 2024 * Technique The Role of Observability in Microservice Security February 7, 2024 * Malware XPhase Clipper: The Global Crypto Scam Unveiled by CRIL February 7, 2024 * Vulnerability PoC Releases for Oracle WebLogic Server Servers RCE Flaw (CVE-2024-20931) February 7, 2024 * active directory android Apple backdoor BurpSuite chrome CISA cisco cyberattack Data Breach facebook gitlab google google chrome hacker kali linux Linux Linux Kernel malware metasploit Microsoft nmap OSINT penetration testing Pentesting PoC powershell privilege escalation Python ransomware shodan sqli sql injection sqlmap ssh Ubuntu vmware Vulnerability web app webapp pentest webshell windows wireless wordpress XSS Reward BRILLIANTLY SAFE! securityonline.info CONTENT & LINKS Verified by Sur.ly 2022 WEBSITE 1. About SecurityOnline.info 2. Advertise on SecurityOnline.info 3. Contact * About Us * Contact Us * Disclaimer * Privacy Policy * DMCA NOTICE Penetration Testing © 2024. All Rights Reserved. * * * * * * x x