Android Users Have A New Security Alert From The Indian Govt: Here’s What We Know

1 month ago

Last Updated: March 14, 2024, 08:30 IST

Delhi, India

The Indian govt has a new Android security issue that needs immediate attention

The Indian govt has a new Android security issue that needs immediate attention

India's security agency CERT-In has listed a fresh set of vulnerabilities affecting Android users. Here's what you can do to be safe.

The Indian government has issued a new security warning for millions of Android users with its latest bulletin courtesy, the Indian Computer Emergency Response Team (CERT-In) this week. The team emphasises that these exploits have the potential to allow attackers to gain sensitive information and execute arbitrary code on your phone.

CERT-In Android Security Alert: What It Says

The new vulnerabilities affect Android versions 12, 12L, 13, and the latest 14 as well. The number of phones running these versions in India should easily be over 10 million, which means the high severity ranked alert is worth heeding for one and all.

CERT-In highlights that multiple vulnerabilities exist within the framework, system, ARM components, and MediaTek components, Qualcomm components, and Qualcomm close-sourced components.

Having these many chip makers on the affected list means, brands like Samsung, Realme, OnePlus, Xiaomi and Vivo have to be concerned about the issue, and make sure they release security patches for these vulnerabilities right away. The good news is that, most of the phone brands have been notified about these issues, and the latest security patch has already been released, with all of them expected to get it done in the next few weeks.

In the meanwhile, the CERT-In bulletin advises people against installing apps from unknown sources, or click on links from unknown senders or mail.

S Aadeetya

S Aadeetya, Special Correspondent at News18 Tech, accidentally got into journalism 10 years ago, and since then, has been part of established media ho

...Read More

Read Full Article at Source