SB2025030556 - Multiple vulnerabilities in Google Pixel
Published: March 5, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2025-22377)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Pixel Modem subcomponent in Pixel. A local application can execute arbitrary code.
2) Information exposure (CVE-ID: CVE-2024-56187)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the LDFW subcomponent in Pixel. A local application can gain access to sensitive information.
3) Improper input validation (CVE-ID: CVE-2024-56188)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Modem subcomponent in Pixel. A local application can perform a denial of service (DoS) attack.
4) Information exposure (CVE-ID: CVE-2024-56184)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Trusty subcomponent in Pixel. A local application can gain access to sensitive information.
5) Information exposure (CVE-ID: CVE-2024-56185)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Exynos RIL subcomponent in Pixel. A local application can gain access to sensitive information.
6) Information exposure (CVE-ID: CVE-2024-56186)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Modem subcomponent in Pixel. A local application can gain access to sensitive information.
7) Improper input validation (CVE-ID: CVE-2024-20003)
The vulnerability allows a local application to perform service disruption.
The vulnerability exists due to an improper input validation within Modem NL1. A local application can perform service disruption.
Remediation
Install update from vendor's website.