
Google has released a critical security update for Pixel devices, addressing a zero-day vulnerability that has been actively exploited in the wild.
The vulnerability tracked as CVE-2024-32896 is an elevation of privilege issue in Pixel Firmware, underscores the importance of promptly updating your devices to safeguard against potential attacks.
Google revealed limited information about the zero-day, stating only that it has indications of targeted exploitation. “There are indications that CVE-2024-32896 may be under limited, targeted exploitation.” However, the urgency of the patch highlights the severity of the threat. Alongside this zero-day fix, Google’s June security update also addresses over 40 additional vulnerabilities, including multiple critical elevation of privilege issues and high-severity remote code execution (RCE) bugs affecting various Pixel components.
This month patch release cycle covers not only Pixel-specific flaws but also includes fixes for Qualcomm and Qualcomm closed-source components. While Pixel devices run on Android, they receive separate updates due to their unique features and hardware platform, which is directly managed by Google.
Users are strongly advised to immediately install the latest security update to protect their Pixel devices from potential threats.
Patch Summary
| CVE | Severity |
| CVE-2024-32891 | Critical |
| CVE-2024-32892 | Critical |
| CVE-2024-32899 | Critical |
| CVE-2024-32906 | Critical |
| CVE-2024-32908 | Critical |
| CVE-2024-32909 | Critical |
| CVE-2024-32922 | Critical |
| CVE-2024-29786 | High |
| CVE-2024-32905 | High |
| CVE-2024-32913 | High |
| CVE-2024-32925 | High |
| CVE-2024-32895 | High |
| CVE-2024-32896 | High |
| CVE-2024-32901 | High |
| CVE-2024-32907 | High |
| CVE-2024-32911 | High |
| CVE-2024-32917 | High |
| CVE-2024-29780 | High |
| CVE-2024-29781 | High |
| CVE-2024-29785 | High |
| CVE-2024-32893 | High |
| CVE-2024-32894 | High |
| CVE-2024-32910 | High |
| CVE-2024-32914 | High |
| CVE-2024-32916 | High |
| CVE-2024-32918 | High |
| CVE-2024-32920 | High |
| CVE-2024-32930 | High |
| CVE-2023-50803 | High |
| CVE-2024-32902 | High |
| CVE-2024-32923 | High |
| CVE-2024-29784 | Moderate |
| CVE-2024-29787 | Moderate |
| CVE-2024-32900 | Moderate |
| CVE-2024-32903 | Moderate |
| CVE-2024-32919 | Moderate |
| CVE-2024-32921 | Moderate |
| CVE-2024-29778 | Moderate |
| CVE-2024-32897 | Moderate |
| CVE-2024-32898 | Moderate |
| CVE-2024-32904 | Moderate |
| CVE-2024-32915 | Moderate |
| CVE-2024-32926 | Moderate |
| CVE-2024-32912 | Moderate |
| CVE-2024-32924 | Moderate |
| CVE-2023-43537 | Moderate |
| CVE-2023-43543 | Moderate |
| CVE-2023-43544 | Moderate |
| CVE-2023-43545 | Moderate |
| CVE-2023-43555 | Moderate |


