• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies

You are here: Home / Cyber Security News / Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies

Google has disclosed that two Android security flaws impacting its Pixel smartphones have been exploited in the wild by forensic companies.

The superior-severity zero-working day vulnerabilities are as follows –

  • CVE-2024-29745 – An data disclosure flaw in the bootloader part
  • CVE-2024-29748 – A privilege escalation flaw in the firmware ingredient

“There are indications that the [vulnerabilities] might be less than confined, specific exploitation,” Google explained in an advisory released April 2, 2024.

Though the tech big did not expose any other facts about the mother nature of the attacks exploiting these shortcomings, the maintainers of GrapheneOS mentioned they “are being actively exploited in the wild by forensic businesses.”

“CVE-2024-29745 refers to a vulnerability in the fastboot firmware made use of to guidance unlocking/flashing/locking,” they claimed in a collection of posts on X (previously Twitter).

“Forensic businesses are rebooting devices in Right after Very first Unlock point out into fastboot mode on Pixels and other products to exploit vulnerabilities there and then dump memory.”

GrapheneOS famous that CVE-2024-29748 could be weaponized by neighborhood attackers to interrupt a manufacturing unit reset induced via the machine admin API.

The disclosure comes a lot more than two months immediately after the GrapheneOS team uncovered that forensic companies are exploiting firmware vulnerabilities that influence Google Pixel and Samsung Galaxy phones to steal data and spy on customers when the product is not at rest.

It also urged Google to introduce an vehicle-reboot element to make exploitation of firmware flaws much more challenging.

Identified this posting exciting? Adhere to us on Twitter  and LinkedIn to browse additional special material we write-up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « U.S. Cyber Safety Board Slams Microsoft Over Breach by China-Based Hackers
Next Post: Ivanti Rushes Patches for 4 New Flaw in Connect Secure and Policy Secure »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals

Copyright © 2025 · AllTech.News, All Rights Reserved.