INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 36m Global insider Cybersecurity Services CRITICAL 46m Global ransomware Multiple sectors (U.S. companies) CRITICAL 59m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 36m Global insider Cybersecurity Services CRITICAL 46m Global ransomware Multiple sectors (U.S. companies) CRITICAL 59m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 36m Global insider Cybersecurity Services CRITICAL 46m Global ransomware Multiple sectors (U.S. companies) CRITICAL 59m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h
Vulnerabilities

CVE-2023-35674

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Android Framework Privilege Escalation Vulnerability — Android Framework contains an unspecified vulnerability that allows for privilege escalation.
Published: Sep 13, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Android Framework Privilege Escalation Vulnerability — Android Framework contains an unspecified vulnerability that allows for privilege escalation.

🤖 AI Executive Summary

CVE-2023-35674 is a critical privilege escalation vulnerability in the Android Framework with a CVSS score of 9.0, actively exploited in the wild. The flaw allows malicious applications or threat actors to elevate privileges on affected Android devices without user interaction. This vulnerability poses significant risk to enterprise mobile fleets, BYOD environments, and government-issued Android devices. Immediate patching is strongly recommended given confirmed exploit availability.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 18, 2026 02:17
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations face elevated risk across multiple critical sectors. Government entities under NCA oversight using Android-based mobile devices for official communications are at high risk of credential theft and unauthorized access to sensitive systems. Banking and financial institutions regulated by SAMA that deploy Android devices for mobile banking applications, two-factor authentication, and employee workflows face potential account takeover and data exfiltration. Saudi Aramco and energy sector organizations using Android devices in operational environments risk lateral movement into OT-adjacent networks. Telecom providers such as STC and Zain face risks to customer-facing applications and internal mobile infrastructure. Healthcare organizations using Android tablets for patient management systems are also at significant risk. The widespread adoption of Android in Saudi Arabia's Vision 2030 digital transformation initiatives amplifies the attack surface considerably.
🏢 Affected Saudi Sectors
Government Banking Energy Telecom Healthcare Education Retail Transportation
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Apply Google's September 2023 Android Security Bulletin patches immediately across all managed Android devices.
2. Prioritize patching Android devices with access to sensitive corporate resources, VPN clients, or MDM enrollment.
3. Enforce Mobile Device Management (MDM) policies to restrict sideloading of applications from unknown sources.

PATCHING GUIDANCE:
1. Update all Android devices to the September 2023 security patch level (2023-09-01 or later).
2. For Samsung, Pixel, and other OEM devices, apply vendor-specific security updates as they become available.
3. Devices that cannot be patched should be isolated from corporate networks immediately.

COMPENSATING CONTROLS (if patch unavailable):
1. Restrict installation of third-party applications via MDM policy enforcement.
2. Implement network segmentation to limit Android device access to critical internal systems.
3. Enable Google Play Protect and ensure it is actively scanning installed applications.
4. Deploy Mobile Threat Defense (MTD) solutions to detect exploitation attempts.
5. Enforce conditional access policies requiring compliant device posture before granting access to corporate resources.

DETECTION RULES:
1. Monitor MDM logs for devices with outdated security patch levels.
2. Alert on unexpected privilege escalation events in Android enterprise logs.
3. Monitor for anomalous application behavior or unexpected system-level API calls.
4. Implement SIEM rules to detect lateral movement originating from mobile device IP ranges.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تطبيق تصحيحات نشرة أمان Android لشهر سبتمبر 2023 فوراً على جميع أجهزة Android المُدارة.
2. إعطاء الأولوية لتصحيح أجهزة Android التي تصل إلى الموارد المؤسسية الحساسة أو عملاء VPN أو تسجيل MDM.
3. فرض سياسات إدارة الأجهزة المحمولة (MDM) لتقييد تثبيت التطبيقات من مصادر غير معروفة.

إرشادات التصحيح:
1. تحديث جميع أجهزة Android إلى مستوى تصحيح الأمان لسبتمبر 2023 (2023-09-01 أو أحدث).
2. بالنسبة لأجهزة Samsung وPixel وغيرها من الشركات المصنعة، تطبيق التحديثات الأمنية الخاصة بالبائع فور توفرها.
3. يجب عزل الأجهزة التي لا يمكن تصحيحها عن شبكات الشركة فوراً.

ضوابط التعويض (إذا لم يكن التصحيح متاحاً):
1. تقييد تثبيت التطبيقات من جهات خارجية عبر فرض سياسة MDM.
2. تنفيذ تجزئة الشبكة للحد من وصول أجهزة Android إلى الأنظمة الداخلية الحيوية.
3. تفعيل Google Play Protect والتأكد من فحصه النشط للتطبيقات المثبتة.
4. نشر حلول الدفاع عن التهديدات المحمولة (MTD) للكشف عن محاولات الاستغلال.
5. فرض سياسات الوصول المشروط التي تتطلب وضع جهاز متوافق قبل منح الوصول إلى موارد الشركة.

قواعد الكشف:
1. مراقبة سجلات MDM للأجهزة ذات مستويات تصحيح الأمان القديمة.
2. التنبيه على أحداث رفع الامتيازات غير المتوقعة في سجلات Android المؤسسية.
3. مراقبة السلوك الشاذ للتطبيقات أو استدعاءات API غير المتوقعة على مستوى النظام.
4. تنفيذ قواعد SIEM للكشف عن الحركة الجانبية الصادرة من نطاقات IP للأجهزة المحمولة.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Asset Management — Mobile Device Inventory and Patch Status ECC-2-3-1: Cybersecurity Vulnerability Management — Patch Management ECC-2-3-2: Cybersecurity Vulnerability Management — Vulnerability Scanning ECC-3-3-6: Mobile Device Security Controls ECC-2-2-1: Identity and Access Management — Privilege Management
🔵 SAMA CSF
3.3.4: Vulnerability Management 3.3.5: Patch Management 3.3.9: Mobile Device Security 3.2.3: Access Control and Privilege Management 3.4.2: Endpoint Security
🟡 ISO 27001:2022
A.8.8: Management of Technical Vulnerabilities A.8.1: User Endpoint Devices A.5.15: Access Control A.8.2: Privileged Access Rights A.8.19: Installation of Software on Operational Systems
🟣 PCI DSS v4.0
Requirement 6.3.3: All system components are protected from known vulnerabilities by installing applicable security patches Requirement 12.3.4: Hardware and software technologies are reviewed at least once every 12 months Requirement 8.2: User identification and authentication management for mobile devices
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Android:Framework
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS0.09%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-10-04
Published 2023-09-13
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.