{"id":236031,"date":"2024-06-25T02:09:26","date_gmt":"2024-06-25T02:09:26","guid":{"rendered":"https:\/\/michigandigitalnews.com\/index.php\/2024\/06\/25\/government-workers-are-being-told-to-immediately-update-their-pixel-phones-to-patch-a-serious-exploit\/"},"modified":"2025-06-25T17:16:16","modified_gmt":"2025-06-25T17:16:16","slug":"government-workers-are-being-told-to-immediately-update-their-pixel-phones-to-patch-a-serious-exploit","status":"publish","type":"post","link":"https:\/\/michigandigitalnews.com\/index.php\/2024\/06\/25\/government-workers-are-being-told-to-immediately-update-their-pixel-phones-to-patch-a-serious-exploit\/","title":{"rendered":"Government workers are being told to immediately update their Pixel phones to patch a serious exploit"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p>The US government has issued a dire warning to employees with Pixel phones, mandating a security update by July 4, <a data-i13n=\"cpos:1;pos:1\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2024\/06\/23\/google-pixel-warning-10-days-to-update-or-stop-using-phone\/\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:as originally reported by Forbes;cpos:1;pos:1;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">as originally reported by <em>Forbes<\/em><\/a>. This is due to a high-severity firmware vulnerability within the Android operating system that could open up devices to \u201climited, targeted exploitation.\u201d<\/p>\n<p>There\u2019s <a data-i13n=\"cpos:2;pos:1\" href=\"https:\/\/source.android.com\/docs\/security\/bulletin\/pixel\/2024-06-01\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:already a patch;cpos:2;pos:1;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">already a patch<\/a> for the zero-day exploit but it requires a visit to the settings app to make sure the device is up to date. Government employees who do not install the security update by July 4 must \u201cdiscontinue use of the product.\u201d It should go without saying that the rest of us should also heed these warnings, particularly those who connect to enterprise servers.<\/p>\n<p>Google has remained mum as to the actual details of the vulnerability, but government involvement makes it seem a bit more serious than your average exploit. The federal mandate is directed exclusively at Pixel devices, but it looks like the exploit could extend to other Android phones.<\/p>\n<p>The folks behind GrapheneOS, an operating system based on Android, note that the vulnerability is not exclusive to Pixel phones. The organization says a fix will be part of any update to Android 15, which releases in August, but that it hasn\u2019t been backported. So, if you opt not to update the OS, you likely won\u2019t get the patch. It remains unclear if there are any other options for mitigation. We reached out to Google and will update this post when we know more.<\/p>\n<div class=\"twitter-tweet-wrapper\" data-embed-anchor=\"d5dcf533-f43e-5700-b129-2fd3a2195a18\">\n<blockquote placeholder=\"\" data-theme=\"light\" class=\"twitter-tweet\">\n<p>CVE-2024-32896 which is marked as being actively exploited in the wild in the June 2024 Pixel Update Bulletin is the 2nd part of the fix for CVE-2024-29748 vulnerability we described here:<a href=\"https:\/\/t.co\/c4xnnbje04\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:https:\/\/t.co\/c4xnnbje04;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">https:\/\/t.co\/c4xnnbje04<\/a><\/p>\n<p>As we explained there, none of this is actually Pixel specific.<\/p>\n<p>\u2014 GrapheneOS (@GrapheneOS) <a href=\"https:\/\/twitter.com\/GrapheneOS\/status\/1801221485324800417?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:June 13, 2024;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">June 13, 2024<\/a><\/p>\n<\/blockquote>\n<\/div>\n<p>The warning issued by the US government, as described in the <a data-i13n=\"cpos:3;pos:1\" href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:Known Exploited Vulnerabilities (KEV) catalog;cpos:3;pos:1;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">Known Exploited Vulnerabilities (KEV) catalog<\/a>, is also stingy with the details. The advisory simply states that \u201cAndroid Pixel contains an unspecified vulnerability in the firmware that allows for privilege escalation.\u201d GrapheneOS says the exploit fails to wipe the memory when running a firmware-based fastboot mode, which potentially allows nefarious actors to exploit the system \u201cto get previous OS memory.\u201d<\/p>\n<p>To recap, update your Pixel Phone immediately via the settings app, while those with other Android phones should sit tight for now. It\u2019s never wise to mess with <a data-i13n=\"cpos:4;pos:1\" href=\"https:\/\/www.engadget.com\/google-just-patched-the-fifth-zero-day-exploit-for-chrome-this-year-153723334.html\" data-ylk=\"slk:these zero-day exploits;cpos:4;pos:1;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">these zero-day exploits<\/a> and the involvement of the US government has certainly heightened the threat level a bit here.<\/p>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.engadget.com\/government-workers-are-being-told-to-immediately-update-their-pixel-phones-to-patch-a-serious-exploit-172155317.html?src=rss\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] The US government has issued a dire warning to employees with Pixel phones, mandating a security update by July 4, as originally reported by<\/p>\n","protected":false},"author":1,"featured_media":236032,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[159],"tags":[],"_links":{"self":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/236031"}],"collection":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/comments?post=236031"}],"version-history":[{"count":0,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/236031\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media\/236032"}],"wp:attachment":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media?parent=236031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/categories?post=236031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/tags?post=236031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}