{"vulnerability": "CVE-2024-3289", "sightings": [{"uuid": "a7fe92e5-46a8-4b70-a301-b56a9fb559cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-06-13T18:10:02.000000Z"}, {"uuid": "0973e722-3006-4609-98da-5c84e1fdbd24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "seen", "source": "https://bsky.app/profile/kriptabiz.bsky.social/post/3lkszqt4za42j", "content": "", "creation_timestamp": "2025-03-20T15:38:23.274595Z"}, {"uuid": "be4c596e-13e8-4f7c-a683-4a7aa9c551e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:31:00.000000Z"}, {"uuid": "0528d56c-35bb-4d55-af57-bbe220d5759b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:55.000000Z"}, {"uuid": "2b2d23bc-4e31-45ff-8d19-3151f866d07a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lv7esqxcwa2j", "content": "", "creation_timestamp": "2025-07-30T19:40:12.539766Z"}, {"uuid": "487bb946-1121-4ebe-a02c-09c4994651ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/BleepingComputer/20613", "content": "\u200aGoogle backports fix for Pixel EoP flaw to other Android devices\n\nGoogle has released the September 2024 Android security updates to fix 34 vulnerabilities, including CVE-2024-32896, an actively exploited elevation of privilege flaw that was previously fixed on Pixel devices. [...]\n\nhttps://www.bleepingcomputer.com/news/security/google-backports-fix-for-pixel-eop-flaw-to-other-android-devices/", "creation_timestamp": "2024-09-04T16:14:23.000000Z"}, {"uuid": "29882d34-7a35-48e0-b0a4-75de530f6402", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/05bba1d4-c37d-4a17-bff6-dff2f6830651", "content": "", "creation_timestamp": "2026-02-02T12:26:35.027035Z"}, {"uuid": "8ec97ac1-ec63-4a8e-81d6-56a9898b76e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "Telegram/CKWWTYkq0NS-H0GLXkCO6AnwLJTttLy1S-s780enETgJIRE", "content": "", "creation_timestamp": "2024-09-04T21:35:22.000000Z"}, {"uuid": "38d7de77-35e2-432d-a913-e4f7acfff4a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32892", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7473", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-32892\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In handle_init of goodix/main/main.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2024-06-13T21:01:56.914Z\n\ud83d\udccf Modified: 2025-03-13T19:35:37.644Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2024-06-01", "creation_timestamp": "2025-03-13T19:42:31.000000Z"}, {"uuid": "aa91df6f-c67e-433f-812c-99f39d77fa93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "seen", "source": "https://t.me/codeby_sec/8358", "content": "\ud83d\udc69\u200d\ud83d\udcbb\u00a0Google \u0437\u0430\u043a\u0440\u044b\u043b\u0430 34 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Android\n\nGoogle \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f Android, \u0437\u0430\u043a\u0440\u044b\u0432 34 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u0443\u044e CVE-2024-32896. \u042d\u0442\u0430 \u043e\u0448\u0438\u0431\u043a\u0430, \u043e\u0446\u0435\u043d\u0451\u043d\u043d\u0430\u044f \u043d\u0430 7,8 \u0431\u0430\u043b\u043b\u0430 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0445\u0430\u043a\u0435\u0440\u0430\u043c \u043e\u0431\u043e\u0439\u0442\u0438 \u0437\u0430\u0449\u0438\u0442\u0443 Android \u0438 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438.\n\n\u23fa\ufe0f\u0414\u043b\u044f \u0430\u0442\u0430\u043a\u0438 \u043d\u0443\u0436\u043d\u043e \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c, \u0447\u0442\u043e \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0432\u0430\u0435\u0442 \u0435\u0451 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0435.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 Pixel \u0435\u0449\u0451 \u0432 \u0438\u044e\u043d\u0435, \u0430 \u0442\u0435\u043f\u0435\u0440\u044c \u0437\u0430\u0449\u0438\u0442\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0430 \u0438 \u0434\u043b\u044f \u0434\u0440\u0443\u0433\u0438\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u043d\u0430 Android 12, 12L, 13 \u0438 14.", "creation_timestamp": "2024-09-11T17:48:04.000000Z"}, {"uuid": "900554b4-85d9-4653-b2fc-67bcf6eea4bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32897", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7481", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-32897\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In ProtocolCdmaCallWaitingIndAdapter::GetCwInfo() of protocolsmsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2024-06-13T21:01:57.671Z\n\ud83d\udccf Modified: 2025-03-13T19:30:52.525Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2024-06-01", "creation_timestamp": "2025-03-13T19:42:44.000000Z"}, {"uuid": "3c3f9e65-2466-4547-b9e1-c3a32062c075", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "seen", "source": "Telegram/NsE_mTFCOjSJbTHln_R1YZZFRmKmacy2al4F27E4YEx6XJl7yQ", "content": "", "creation_timestamp": "2025-10-01T17:45:01.000000Z"}, {"uuid": "9c6b33e3-50e5-4df7-b641-2eedfd75b1da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32894", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9190", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-32894\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In bc_get_converted_received_bearer of bc_utilities.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2024-06-13T21:01:57.220Z\n\ud83d\udccf Modified: 2025-03-27T19:03:15.273Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2024-06-01", "creation_timestamp": "2025-03-27T19:27:03.000000Z"}, {"uuid": "9a05c202-db64-4391-96d7-244a7d90cf3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "Telegram/Iim6GAzGISfqlKN0Vv2P9n9oFqZuEZlRR3nrIcqiGVsa6i4", "content": "", "creation_timestamp": "2024-06-13T10:32:14.000000Z"}, {"uuid": "6579c0d5-54f3-4fad-b95c-26631b1e9ef9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/cibsecurity/79437", "content": "\ud83d\udd8b\ufe0f Google Confirms CVE-2024-32896 Exploited in the Wild, Releases Android Security Patch \ud83d\udd8b\ufe0f\n\nGoogle has released its monthly security updates for the Android operating system to address a known security flaw that it said has come under active exploitation in the wild. The highseverity vulnerability, tracked as CVE202432896 CVSS score 7.8, relates to a case of privilege escalation in the Android Framework component. According to the description of the bug in the NIST National.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2024-09-04T16:15:39.000000Z"}, {"uuid": "5f65059b-d9fa-4c63-a386-1543203fa739", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/CyberBulletin/547", "content": "\u26a1\ufe0fGoogle fixed actively exploited Android flaw CVE-2024-32896.\n\n#CyberBulletin", "creation_timestamp": "2024-09-05T07:06:04.000000Z"}, {"uuid": "667df14a-f3e4-43d7-8671-fe897d8ac67a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "Telegram/gBY_DeXn3jg3ahbDqiFiYrlP_2NVu8p_IIPrqMTjGV2llQ", "content": "", "creation_timestamp": "2024-06-13T12:41:50.000000Z"}, {"uuid": "bc04147d-16f1-4bd2-9a51-0cfbbe9d0f5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "seen", "source": "https://t.me/ViralCyber/3280", "content": "\ud83d\udfe1\u0647\u0634\u062f\u0627\u0631 \u06af\u0648\u06af\u0644 \u062f\u0631\u0628\u0627\u0631\u0647 \u0634\u06a9\u0627\u0641 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0648\u0628\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u0627\u0646\u062f\u0631\u0648\u06cc\u062f\u06cc\n\n\ud83d\udd36\u06af\u0648\u06af\u0644 \u0627\u0639\u0644\u0627\u0645 \u06a9\u0631\u062f \u06cc\u06a9 \u0634\u06a9\u0627\u0641 \u0627\u0645\u0646\u06cc\u062a\u06cc \u062e\u0637\u0631\u0646\u0627\u06a9 \u06a9\u0647 \u062f\u0631 \u0645\u0648\u0628\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u067e\u06cc\u06a9\u0633\u0644 \u0628\u0627 \u0627\u0631\u0627\u0626\u0647 \u0622\u067e\u062f\u06cc\u062a \u0627\u0645\u0646\u06cc\u062a\u06cc \u0628\u0631\u0637\u0631\u0641 \u0634\u062f\u0647 \u0647\u0645\u0686\u0646\u0627\u0646 \u062f\u0631 \u0645\u0648\u0628\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u06af\u0644\u06a9\u0633\u06cc \u0633\u0627\u0645\u0633\u0648\u0646\u06af \u0648 \u062f\u06cc\u06af\u0631 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc \u0627\u0646\u062f\u0631\u0648\u06cc\u062f \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f.\n\ud83d\udd36 \u0686\u0646\u062f\u06cc \u0642\u0628\u0644 \u062f\u0648\u0644\u062a \u0622\u0645\u0631\u06cc\u06a9\u0627 \u0628\u0647 \u062a\u0645\u0627\u0645 \u06a9\u0627\u0631\u0645\u0646\u062f\u0627\u0646 \u0622\u0698\u0627\u0646\u0633\u200c\u0647\u0627\u06cc \u0641\u062f\u0631\u0627\u0644 \u06a9\u0647 \u0645\u0648\u0628\u0627\u06cc\u0644 \u067e\u06cc\u06a9\u0633\u0644 \u062f\u0627\u0634\u062a\u0646\u062f\u060c \u062f\u0633\u062a\u0648\u0631 \u062f\u0627\u062f \u062c\u062f\u06cc\u062f\u062a\u0631\u06cc\u0646 \u0622\u067e\u062f\u06cc\u062a \u0627\u0645\u0646\u06cc\u062a\u06cc \u0631\u0627 \u0642\u0628\u0644 \u0627\u0632 \u06f4 \u062c\u0648\u0644\u0627\u06cc \u0633\u0627\u0644 \u062c\u0627\u0631\u06cc \u0645\u06cc\u0644\u0627\u062f\u06cc \u0646\u0635\u0628 \u06a9\u0646\u0646\u062f \u062f\u0631 \u063a\u06cc\u0631 \u0627\u06cc\u0646\u0635\u0648\u0631\u062a \u0627\u0632 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc\u0634\u0627\u0646 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0646\u06a9\u0646\u0646\u062f.\n\ud83d\udd36\u0627\u06cc\u0646 \u062f\u0633\u062a\u0648\u0631 \u0627\u0632 \u0633\u0648\u06cc \u0622\u0698\u0627\u0646\u0633 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0648 \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a \u0622\u0645\u0631\u06cc\u06a9\u0627 \u0635\u0627\u062f\u0631 \u0634\u062f\u0647 \u0628\u0648\u062f \u06a9\u0647 \u0637\u0628\u0642 \u0622\u0646 \u0634\u06a9\u0627\u0641 \u0627\u0645\u0646\u06cc\u062a\u06cc CVE-\u06f2\u06f0\u06f2\u06f4-\u06f3\u06f2\u06f8\u06f9\u06f6 \u062f\u0631 \u0645\u0648\u0628\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u06af\u0648\u06af\u0644 \u0628\u0647 \u0637\u0648\u0631 \u0645\u062d\u062f\u0648\u062f \u0631\u0635\u062f \u0634\u062f\u0647\u200c \u0628\u0648\u062f.\n\n@FanavaranNewspaper", "creation_timestamp": "2024-07-04T22:58:47.000000Z"}, {"uuid": "fe78aafc-4ff7-450e-b791-f03c8a99fe21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "Telegram/Xk52fHHzpoxGZJST8pDfLLQctSfHu0m5waJyFky7eyTltw", "content": "", "creation_timestamp": "2024-09-04T18:18:54.000000Z"}, {"uuid": "1adeca84-8fb2-46d4-9741-c7c9f6deefae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/Blackhat_Officials/1060", "content": "\ud83d\udcbb 0day \u0432 Pixel: Google \u0432\u044b\u043f\u0443\u0441\u043a\u0430\u0435\u0442 \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u044b\u0439 \u043f\u0430\u0442\u0447 \u0434\u043b\u044f \u0441\u0432\u043e\u0438\u0445 \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u043e\u0432\n\n\u0412\u0441\u043b\u0435\u0434 \u0437\u0430 \u0443\u0436\u0435 \u043f\u0440\u0438\u0432\u044b\u0447\u043d\u044b\u043c Patch Tuesday \u043e\u0442 Microsoft, \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Google \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f 50 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u0441\u0432\u043e\u0438\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 Pixel \u0438 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0430, \u0447\u0442\u043e \u043e\u0434\u043d\u0430 \u0438\u0437 \u043d\u0438\u0445, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043a CVE-2024-32896, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043e\u0448\u0438\u0431\u043a\u0443 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 (EoP) \u0438 \u0443\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 Zero-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u00ab\u0415\u0441\u0442\u044c \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u0438 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e CVE-2024-32896 \u0443\u0436\u0435 \u043c\u043e\u0433\u043b\u0430 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0440\u0430\u043d\u0435\u0435 \u0432 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u0445 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445\u00bb, \u2014 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f. \u00ab\u0412\u0441\u0435 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 Google \u043f\u043e\u043b\u0443\u0447\u0430\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e \u0443\u0440\u043e\u0432\u043d\u044f \u043f\u0430\u0442\u0447\u0430 2024-06-05. \u041c\u044b \u043f\u0440\u0438\u0437\u044b\u0432\u0430\u0435\u043c \u0432\u0441\u0435\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Pixel \u043d\u0435\u0437\u0430\u043c\u0435\u0434\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u044d\u0442\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0430 \u0441\u0432\u043e\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u00bb.\n\nGoogle \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430 44 \u0434\u0440\u0443\u0433\u0438\u0445 \u043e\u0448\u0438\u0431\u043a\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043d\u0435\u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u043a\u0430\u0441\u0430\u044e\u0449\u0438\u0435\u0441\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Pixel. \u0421\u0435\u043c\u044c \u0438\u0437 \u043d\u0438\u0445 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438 \u0441\u0447\u0438\u0442\u0430\u044e\u0442\u0441\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c\u0438.", "creation_timestamp": "2024-06-19T18:42:30.000000Z"}, {"uuid": "2f18a9ee-2591-48c9-b127-3694c39e0a3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/HackingInsights/12238", "content": "Google Confirms CVE-2024-32896 Exploited in the Wild, Releases Android Security Patch - https://www.redpacketsecurity.com/google-confirms-cve-2024-32896-exploited-in-the-wild-releases-android-security-patch/", "creation_timestamp": "2024-09-08T13:45:49.000000Z"}, {"uuid": "add33a30-3777-4b69-8851-cf18adcdd512", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/HackingInsights/2520", "content": "\u200aCVE-2024-32896: Google Patches Actively Exploited Zero-Day Vulnerability in Pixel Devices\n\nhttps://securityonline.info/cve-2024-32896-google-patches-actively-exploited-zero-day-vulnerability-in-pixel-devices/", "creation_timestamp": "2024-06-14T18:42:14.000000Z"}, {"uuid": "6ccef30b-c49b-4b96-8336-91340d24bf4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/HackingInsights/12048", "content": "Google fixed actively exploited Android flaw CVE-2024-32896\nhttps://ift.tt/YZ6dqug", "creation_timestamp": "2024-09-05T15:04:16.000000Z"}, {"uuid": "405ea275-329c-4c61-a7a2-cd6609949bae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/HackingInsights/12020", "content": "Google Confirms CVE-2024-32896 Exploited in the Wild, Releases Android Security Patch\nhttps://ift.tt/8Spy0WK", "creation_timestamp": "2024-09-05T15:04:14.000000Z"}, {"uuid": "f83977cc-d390-4a13-bfb1-c661a2f7cf5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/19597", "content": "The Hacker News\nAndroid Users Urged to Install Latest Security Updates to Fix Actively Exploited Flaw\n\nGoogle has released its monthly security updates for the Android operating system to address a known security flaw that it said has come under active exploitation in the wild.\nThe high-severity vulnerability, tracked as CVE-2024-32896 (CVSS score: 7.8), relates to a case of privilege escalation in the Android Framework component.\nAccording to the description of the bug in the NIST National", "creation_timestamp": "2024-09-04T18:18:53.000000Z"}, {"uuid": "adc63d40-52e4-4100-b2ff-55c32dc94e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/11601", "content": "The Hacker News\nGoogle Warns of Pixel Firmware Security Flaw Exploited as Zero-Day\n\nGoogle has warned that a security flaw impacting Pixel Firmware has been exploited in the wild as a zero-day.\nThe high-severity vulnerability, tagged as CVE-2024-32896, has been described as an elevation of privilege issue in Pixel Firmware.\nThe company did not share any additional details related to the nature of attacks exploiting it, but noted \"there are indications that CVE-2024-32896 may be", "creation_timestamp": "2024-06-13T12:41:52.000000Z"}, {"uuid": "5ac1a6de-8445-4bb9-a8be-ac0e41ed66e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "Telegram/pbDHEA_QtDcDcSz_pXxohErrTMxvYd14w7fYBPtuKKpYdg", "content": "", "creation_timestamp": "2024-06-13T10:26:22.000000Z"}, {"uuid": "62172ca9-36ae-4cb8-b04e-6542ed13db2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "Telegram/38ceZe5F65w1y_gugJYpOH5AMn5BFw3k9oHnM_dM9HMElQ", "content": "", "creation_timestamp": "2024-09-04T20:43:25.000000Z"}, {"uuid": "957e0b72-fcf2-43b2-9dca-3fb5fb749bbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/2283", "content": "The Hacker News\nGoogle Warns of Pixel Firmware Security Flaw Exploited as Zero-Day\n\nGoogle has warned that a security flaw impacting Pixel Firmware has been exploited in the wild as a zero-day.\nThe high-severity vulnerability, tagged as CVE-2024-32896, has been described as an elevation of privilege issue in Pixel Firmware.\nThe company did not share any additional details related to the nature of attacks exploiting it, but noted \"there are indications that CVE-2024-32896 may be", "creation_timestamp": "2024-06-13T12:41:52.000000Z"}, {"uuid": "ed950625-4fce-438c-822c-65d5cdd9fa01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/KomunitiSiber/2099", "content": "Google Warns of Pixel Firmware Security Flaw Exploited as Zero-Day\nhttps://thehackernews.com/2024/06/google-warns-of-pixel-firmware-security.html\n\nGoogle has warned that a security flaw impacting Pixel Firmware has been exploited in the wild as a zero-day.\nThe high-severity vulnerability, tagged as CVE-2024-32896, has been described as an elevation of privilege issue in Pixel Firmware.\nThe company did not share any additional details related to the nature of attacks exploiting it, but noted \"there are indications that CVE-2024-32896 may be", "creation_timestamp": "2024-06-13T09:54:16.000000Z"}, {"uuid": "b1b2e3da-6d98-40dc-b722-1a918d8a9da2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/3944", "content": "The Hacker News\nAndroid Users Urged to Install Latest Security Updates to Fix Actively Exploited Flaw\n\nGoogle has released its monthly security updates for the Android operating system to address a known security flaw that it said has come under active exploitation in the wild.\nThe high-severity vulnerability, tracked as CVE-2024-32896 (CVSS score: 7.8), relates to a case of privilege escalation in the Android Framework component.\nAccording to the description of the bug in the NIST National", "creation_timestamp": "2024-09-04T18:18:53.000000Z"}, {"uuid": "1cf047b2-5241-40d4-9524-a87402e394f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "seen", "source": "https://t.me/InfoSecInsider/23669", "content": "\u26a1\ufe0fGoogle fixed actively exploited Android flaw CVE-2024-32896.\n\n#CyberBulletin", "creation_timestamp": "2024-09-06T11:36:30.000000Z"}, {"uuid": "a77c3e86-657c-45a4-b277-2278a15c4d19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/KomunitiSiber/2512", "content": "Android Users Urged to Install Latest Security Updates to Fix Actively Exploited Flaw\nhttps://thehackernews.com/2024/09/google-confirms-cve-2024-32896.html\n\nGoogle has released its monthly security updates for the Android operating system to address a known security flaw that it said has come under active exploitation in the wild.\nThe high-severity vulnerability, tracked as CVE-2024-32896 (CVSS score: 7.8), relates to a case of privilege escalation in the Android Framework component.\nAccording to the description of the bug in the NIST National", "creation_timestamp": "2024-09-04T18:15:29.000000Z"}, {"uuid": "90312425-895b-4e92-87bd-3d984234fa5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/xakep_ru/16366", "content": "\u0412 Android \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043d\u0430\u0445\u043e\u0434\u044f\u0449\u0443\u044e\u0441\u044f \u043f\u043e\u0434 \u0430\u0442\u0430\u043a\u0430\u043c\u0438\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0435\u0436\u0435\u043c\u0435\u0441\u044f\u0447\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f Android, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0438 34 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 CVE-2024-32896, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0443\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438 \u0438 \u0440\u0430\u043d\u0435\u0435 \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 Pixel.\n\nhttps://xakep.ru/2024/09/06/cve-2024-32896-patch/", "creation_timestamp": "2024-09-06T20:07:44.000000Z"}, {"uuid": "12549c7b-74ae-4ff3-b73a-2a96726dd07d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/ctinow/222929", "content": "Google Confirms CVE-2024-32896 Exploited in the Wild, Releases Android Security Patch\nhttps://ift.tt/8Spy0WK", "creation_timestamp": "2024-09-04T16:14:44.000000Z"}, {"uuid": "70c25ba3-f773-42f0-aebd-9c6e5b957432", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/ctinow/222957", "content": "Google fixed actively exploited Android flaw CVE-2024-32896\nhttps://ift.tt/YZ6dqug", "creation_timestamp": "2024-09-05T01:19:38.000000Z"}, {"uuid": "41ff70fd-f914-4f12-9a78-2c8f4d3135b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "seen", "source": "https://t.me/information_security_channel/52370", "content": "Google Warns of Pixel Firmware Zero-Day Under Limited, Targeted Exploitation\nhttps://www.securityweek.com/google-warns-of-pixel-firmware-zero-day-under-limited-targeted-exploitation/\n\nThe zero-day is tagged as CVE-2024-32896 and described as an elevation of privilege issue in Pixel Firmware. \nThe post Google Warns of Pixel Firmware Zero-Day Under Limited, Targeted Exploitation (https://www.securityweek.com/google-warns-of-pixel-firmware-zero-day-under-limited-targeted-exploitation/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-06-12T21:20:50.000000Z"}, {"uuid": "5be77a49-565d-4133-8bf6-e2d48f4f9efa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/thehackernews/5108", "content": "\ud83d\udea8 ALERT: Google Pixel users, update your devices now. \n \nGoogle has disclosed a high-severity security flaw, CVE-2024-32896, in Pixel Firmware, currently being exploited as a zero-day vulnerability. \n \nRead: https://thehackernews.com/2024/06/google-warns-of-pixel-firmware-security.html", "creation_timestamp": "2024-06-13T09:58:33.000000Z"}, {"uuid": "faa76909-e536-402f-9ae8-3a7437d400ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "seen", "source": "https://t.me/anti_malware/17937", "content": "Samsung \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0430 \u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0435\u0432 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0441\u0435\u0440\u0438\u0438 Galaxy \u043e \u0433\u043e\u0442\u043e\u0432\u044f\u0449\u0435\u043c\u0441\u044f \u043f\u0430\u0442\u0447\u0435 \u0434\u043b\u044f \u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0439 \u043f\u043e\u0434 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u043e\u043c CVE-2024-32896. \u041e\u0436\u0438\u0434\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u043e\u043b\u0443\u0447\u0430\u0442 \u0437\u0430\u043f\u043b\u0430\u0442\u043a\u0438 \u0432 \u0430\u0432\u0433\u0443\u0441\u0442\u0435.", "creation_timestamp": "2024-08-23T15:10:54.000000Z"}, {"uuid": "1670dfe4-e08c-4964-adb8-f3fb7581f283", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32896", "type": "exploited", "source": "https://t.me/InfoSecInsider/190", "content": "\u26a1\ufe0fGoogle fixed actively exploited Android flaw CVE-2024-32896.\n\n#CyberBulletin", "creation_timestamp": "2024-09-06T11:36:43.000000Z"}]}