

When a program is unable to perform a proper verification of input, using unintended input can influence program data flow handling. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code. The vulnerability exists due to improper input validation within the System component. Here's what we know so far:ĬVE-2023-21085: A vulnerability in the System component which allows a remote attacker to execute arbitrary code. Access to bug details and links are usually restricted until the majority of users are updated with a fix. Google never discloses a lot of details about these vulnerabilities. You should get notifications when updates are available for you, but you can also check for updates.įor most phones it works like this: Under About phone or About device you can tap on Software updates to check if there are new updates available for your device, although there may be slight differences based on the brand, type, and Android version of your device. You can find your Android's version number, security update level, and Google Play system level in your Settings app. Android partners are notified of all issues at least a month before publication, however this doesn’t always mean that the patches are available for devices from all vendors. If your Android is on security patch level or later, this will address all of these issues. The vulnerabilities are impacting Android systems running versions 11, 12, 12L, and 13.


In the April 2023 Android security bulletin, Google announced security updates which include fixes for two critical remote code execution (RCE) vulnerabilities and one vulnerability that has been exploited in the wild.
