March 7, 2026

PBX Science

VoIP & PBX, Networking, DIY, Computers.

Google Releases Update to Patch Android USB Driver Zero-Day Vulnerability Exploited by Spyware

Google Releases Update to Patch Android USB Driver Zero-Day Vulnerability Exploited by Spyware



Google Releases Update to Patch Android USB Driver Zero-Day Vulnerability Exploited by Spyware

Google has released a security update to fix a critical Android USB driver vulnerability that was exploited by Serbian authorities to deploy spyware.

The vulnerability allowed attackers to bypass Android lock screens and gain unauthorized access to devices, enabling them to install spyware for comprehensive surveillance.

 

Google Releases Update to Patch Android USB Driver Zero-Day Vulnerability Exploited by Spyware

 


Spyware Deployment via Zero-Day Exploit

Israeli digital intelligence firm Cellebrite provides intelligence gathering and forensic services to its clients. The company also supplies undisclosed zero-day vulnerabilities to facilitate spyware attacks on specific targets.

In December 2024, reports surfaced indicating that Serbia had procured and deployed vulnerabilities and corresponding spyware provided by Cellebrite and NSO Group. These exploits primarily targeted Android smartphones, enabling attackers to bypass lock screens and extract sensitive data.

Google’s Security Patch and Vulnerability Details

As part of its regular Android security update this month, Google patched the security flaw exploited by Cellebrite, which has been assigned the identifier CVE-2024-53104. Additionally, two other vulnerabilities, CVE-2024-53197 and CVE-2024-50302, were patched upstream in the Linux Kernel but have yet to be integrated into the Android Open Source Project (AOSP).

Overview of CVE-2024-53104

This vulnerability primarily affects USB class drivers in the Linux Kernel. It allows entities with physical access—such as Cellebrite’s clients, including Serbian authorities—to bypass Android’s lock screen and gain device access.

Since the flaw exists within the upstream Linux Kernel, it is not limited to Android. Any Linux-based system, including embedded Linux devices, is potentially vulnerable. However, there is currently no evidence suggesting that attackers have exploited this vulnerability against non-Android devices. High-value vulnerabilities like this are often used selectively to avoid detection by security researchers.

Exploitation Methodology

To exploit this vulnerability, an attacker must have physical access to the target device. Using specialized software, they can install spyware, which can then harvest various types of data from the device, including real-time location tracking and live surveillance capabilities.

As part of the attack, the target device’s USB port is initially connected to different peripheral devices. These devices repeatedly establish and disconnect connections to trigger the vulnerability, which leads to kernel memory leaks. The attackers then modify kernel memory as part of the exploitation process.

The USB peripherals used in the attack may include specially designed devices that simulate video or audio input connections to the target device. Once the vulnerability is successfully triggered and access is gained, attackers can install unknown software—namely, spyware—onto the unlocked device.

Google Releases Update to Patch Android USB Driver Zero-Day Vulnerability Exploited by Spyware


Windows Software Alternatives in Linux


Disclaimer of pbxscience.com

PBXscience.com © All Copyrights Reserved. | Newsphere by AF themes.