Security News > 2023 > July > Google: Android patch gap makes n-days as dangerous as zero-days

Google: Android patch gap makes n-days as dangerous as zero-days
2023-07-30 14:16

Google has published its annual 0-day vulnerability report, presenting in-the-wild exploitation stats from 2022 and highlighting a long-standing problem in the Android platform that elevates the value and use of disclosed flaws for extended periods.

Once Google learns about it, it becomes an n-day, with the n reflecting the number of days since it became publicly known.

Google warns that attackers can use n-days to attack unpatched devices for months, using known exploitation methods or devising their own, despite a patch already being made available by Google or another vendor.

This is caused by patch gaps, where Google or another vendor fixes a bug, but it takes months for a device manufacturer to roll it out in their own versions of Android.

In 2022, many issues of this kind impacted Android, most notably CVE-2022-38181, a vulnerability in the ARM Mali GPU. This flaw was reported to the Android Security team in July 2022, deemed as "Won't fix," patched by ARM in October 2022, and finally incorporated in the Android April 2023 security update.

Even after Google releases the Android security update, it takes device vendors up to three months to make the fixes available for supported models, giving attackers yet another window of exploitation opportunity for specific devices.


News URL

https://www.bleepingcomputer.com/news/security/google-android-patch-gap-makes-n-days-as-dangerous-as-zero-days/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2022-10-25 CVE-2022-38181 Use After Free vulnerability in ARM products
The Arm Mali GPU kernel driver allows unprivileged users to access freed memory because GPU memory operations are mishandled.
network
low complexity
arm CWE-416
8.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Android 4 0 17 2 0 19