Google warns that a security flaw affecting its Android operating system is being exploited in the wild.
The vulnerability, tracked as CVE-2024-43093, was described as a privilege escalation flaw in the Android Framework component that could lead to unauthorized access to the “Android/data”, “Android/obb”, and “Android/sandbox” directories. and its subdirectories, according to a code commit message.
There are currently no details on how this vulnerability is used in actual attacks, but Google admitted in its monthly newsletter that there are indications that it “may be under limited, targeted exploitation”.
The tech giant also listed CVE-2024-43047, a patched security bug in Qualcomm chipsets, as being actively exploited. Use-after-release vulnerability in digital signal processor (DSP) service, successful exploitation could lead to memory corruption.
Last month, the chip maker is counted Google Project Zero researchers Seth Jenkins and Congui Wang for reporting the flaw, and Amnesty International Security Lab for confirming activity in the wild.
The advisory did not detail exploits targeting the flaw or when it might have started, although it is possible that it could have been used in targeted espionage attacks targeting members of civil society.
It is also currently unknown whether both security vulnerabilities were created together as a chain of exploits to elevate privileges and achieve code execution.
CVE-2024-43093 is the second most heavily exploited Android Framework flaw after CVE-2024-32896which was patched by Google back in June and September 2024. Although it was initially fixed only for Pixel devices, the company later confirmed that the flaw affects the wider Android ecosystem.