Chat with Us
Loader
Establishing connection, please wait while we connect you.

Lifeguard for Android Updates

Zebra Lifeguard Android security program logo

LifeGuard™ for Android™ is Zebra’s software security solution that extends the lifecycle of Zebra Android enterprise mobile computers. It's a convenient way to receive extended security support, predictable periodic security updates and legacy OS security support when transitioning to a newer OS. 

Device updates are an important way to keep your Android devices secure and running at their full potential. All customers are encouraged to accept these updates to their devices. 

Zebra’s LifeGuard Over The Air service
Avoid Data Loss when updating to Android 13

Read Migrating to Android 13 on TechDocs

Lifeguard Security Bulletins

Note: delivery time of security updates may vary depending on the region, product model, and third party software suppliers. While Zebra makes every attempt to align release of security updates with chipset vendor security bulletins, some patches may require additional time to ensure adequate quality review. Patches will be included in the next scheduled update as ready. Please see individual device support pages for specific guidance.

While Zebra is doing our best to deliver LifeGuard™ for Android™ security patches on a timely basis, we are experiencing delays due to COVID-19. All Zebra LifeGuard patches go through extensive testing within Zebra, are then submitted to a Google certified test laboratory for mandatory retest/verification, and then submitted to Google for final release approval. Unfortunately, many of the Google certified test laboratories have been forced to close due to COVID-19. Zebra does not yet have dates on when the test labs will re-open. Zebra will work to keep you informed as the conditions change. Zebra wishes all our customers and partners great safety and health in these challenging times.

Month Highest Severity Update Impacted Devices
May 2023
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.
ET40x A11
ET45x A11
TC53 A13
TC58 A11
TC73 A13
TC78 A11
WS50 A11

+ Previous Android Bulletins

Month Highest Severity Update Impacted Devices
April 2023
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.
CC600 A11
CC6000 A11
EC30 A11
EC50 A11
EC55 A11
ET40 A11
ET45 A11
ET51 A11
ET56 A11
L10A A11
MC20 A11
MC2200 A11
MC2700 A11
MC3300 O
MC3300ax A11
MC3300R O
MC3300x A11
MC3300xR A11
MC93 A11
PS20 A11
TC20 O, A11
TC25 O
TC26 A11
TC26 HC A11
TC51 O
TC51-HC O
TC52 A11
TC52-HC A11
PS20 A11
TC52ax A11
TC52x A11
TC52x HC A11
TC56 O
TC57 A11
TC57x A11
TC58 A11
TC70x O
TC72 A11
TC75x O
TC77 A11
TC78 A11
TC8300 A11
VC80x O
VC8300 8" A11
VC8300 10" A11
WS50 A11
WT6300 A11
March 2023
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC600 A11
CC6000 A11
EC30 A11
EC50 A11
EC55 A11
ET40 A11
ET51 A11
ET56 A11
L10A A11
MC20 A11
MC2200 A11
MC2700 A11
MC3300ax A11
MC3300x A11
MC3300xR A11
MC93 A11
PS20 A11
TC15 A11
TC21 A13
TC26 A11
TC52 A11
TC52 HC A11
TC52ax A11
TC57 A11
TC57x A11
TC58 A11
TC72 A11
TC77 A11
TC78 A11
TC8300 A11
TN28 A11
VC8300 10" A11
VC8300 8" A11
WS50 A11
WT6300 A11
February 2023
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CC600 A11
CC6000 A11
EC30 A11
EC50 A11
ET40 A11
ET45 A11
ET51 A11
ET56 A11
L10A A11
MC2200 A11
MC2700 A11
MC3300ax A11
MC3300x A11
MC3300xR A11
MC93 A11
MC9300 A11
PS20 A11
TC21 A11, A13
TC26 A11
TC52 A11
TC52ax A11
TC53 A11 A13
TC57 A11
TC58 A11
TC72 A11
TC73 A11 A13
TC77 A11
TC78 A11
TC8300 A11
VC8300 8" A11
VC8300 10" A11
WS50 A11
WT6300 A11

January 2023
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

EC30 A11
EC50 A11
EC55 A11
ET51 A11
ET56 A11
L10 A11
MC2200 A11
MC2700 A11
MC33 O
MC33R O
MC33ax A11
MC33x A11
MC33xR A11
MC9300 A11
TC20 O
TC21 A11
TC25 O
TC26 A11
TC51 O
TC52 A11
TC52x A11
TC53 A11
TC56 O
TC57 A11
TC57x A11
TC58 A11
TC70x O
TC72 A11
TC75x O
TC77 A11
TC8300 A11
VC80x O
WS50 A11
WT6300 A11

December 2022
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC600 A10, A11
CC6000 A10, A11
EC30 A10, A11
EC50 A10, A11
EC55 A10, A11
ET51 A10, A11
ET56 A10, A11
L10A A10, A11
MC20 A11
MC2200 A10, A11
MC2700 A10, A11
MC3300ax A11
MC3300x A10, A11
MC3300xR A10, A11
MC92 K
MC93 A10, A11
PS20 A10, A11
TC21 A10, A11
TC21 HC A10, A11
TC26 A10, A11
TC26 HC A10, A11
TC52AX A11
TC52 A10, A11
TC52 HC A10, A11
TC52x A10, A11
TC53 A11
TC57 A10
TC57x A10, A11
TC58 A11
TC72 A10, A11
TC73 A11
TC77 A10, A11
TC78 A11
TC8300 A10, A11
VC8300 8" A10, A11
VC8300 10" A11
WS50 A11
WT6300 A10, A11

November 2022
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC600 A11
CC6000 A11
EC30 A11
EC50 A11
EC55 A11
ET40 A11
ET45 A11
ET51 A11
ET56 A11
L10A A11
MC20 A11
MC2200 A11
MC2700 A11
MC3300ax A11
MC3300x A11
MC3300xR A11
MC93 A11
PS20 A11
TC21 A11
TC21 HC A11
TC26 A11
TC26 HC A11
TC52 A11
TC52 HC A11
TC52AX A11
TC52x A11
TC52x HC A11
TC53 A11
TC57 A11
TC57x A11
TC58 A11
TC72 A11
TC77 A11
TC8300 A11
VC8300 8" A11
VC8300 10" A11
WS50 A11
WT6000 N
WT6300 A11

October 2022
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC600 A10, A11
CC6000 A10, A11
EC30 A10, A11
EC50 A10, A11
EC55 A10, A11
ET40 A11
ET45 A11
ET51 A10, A11
ET56 A10, A11
L10A A10, A11
MC20 A11
MC2200 A10, A11
MC2700 A10, A11
MC33 O
MC33R O
MC3300ax A11
MC3300x A10, A11
MC3300xR A10, A11
MC93 A10, A11
TC21 A10, A11
TC21 HC A11
TC26 A10, A11
TC26 HC A11
TC20 O
TC25 O
TC51 O
TC52 A10, A11
TC52 HC A11
TC52AX A11
TC52x A10, A11
TC52x HC A11
TC56 O
TC57 A10, A11
TC57x A10, A11
TC72 A10, A11
TC77 A10, A11
TC70x O
TC75x O
TC8300 A10, A11
VC80x O
VC8300 8" A10, A11
VC8300 10" A10, A11
WS50 A11
WT6300 A10, A11

September 2022
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CC600 A10, A11
CC6000 A10, A11
EC30 A10, A11
EC50 A10, A11
EC55 A10, A11
ET40 A11
ET45 A11
ET51 A10, A11
ET56 A10, A11
L10A A10, A11
MC20 A11
MC2200 A10, A11
MC2700 A10, A11
MC3300ax A11
MC3300x A10, A11
MC3300xR A10, A11
MC93 A10, A11
PS20 A10, A11
TC21 A10, A11
TC21 HC A10, A11
TC26 A10, A11
TC26 HC A10, A11
TC52 A10, A11
TC52 HC A10, A11
TC52AX A11
TC52x A10, A11
TC52x HC A10, A11
TC57 A10, A11
TC57x A10, A11
TC72 A10, A11
TC77 A10, A11
TC8300 A10, A11
VC8300 10" A11
VC8300 8" A10, A11
WS50 A11
WT6300 A10, A11

August 2022
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CC600 A11
CC6000 A11
EC30 A11
EC50 A11
EC55 A11
ET50 M
ET51 A11
ET55 M
ET56 A11
L10A A11
MC20 A11
MC2200 A11
MC2700 A11
MC3300ax A11
MC3300x A11
MC3300xR A11
MC93 A11
PS20 A11
TC21 A11
TC21 HC A11
TC26 A11
TC26 HC A11
TC52 A11
TC52 HC A11
TC52AX A11
TC52x A11
TC52x HC A11
TC53 A11
TC57 A11
TC57x A11
TC58 A11
TC70 L
TC72 A11
TC75 L
TC77 A11
TC8300 A11
VC8300 8" A11
VC8300 10" A11
WS50 A11
WT6300 N, A11

July 2022
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CC600 A11
CC6000 A11
EC30 A11
EC50 A11
EC55 A11
ET51 A11
ET56 A11
L10A A11
MC20 A11
MC2200 A11
MC2700 A11
MC3300x A11
MC3300ax A11
MC3300xR A11
MC9300 A11
PS20 A11
TC15 A11
TC21 A11
TC26 A11
TC52 A11
TC52x A11
TC52ax A11
TC53 A11
TC57 A11
TC57x A11
TC58 A11
TC72 A11
TC77 A11
TC8300 A11
TN28 A11
VC8300 8 A11
VC8300 10' A11
WT6300 A11



June 2022
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC600 A10, A11
CC6000 A10, A11
EC30 A10, A11
EC5x A10, A11
ET51 A10, A11
ET56 A10, A11
L10A A10, A11
MC20 A11
MC2200 A10, A11
MC2700 A10, A11
MC3300ax A10, A11
MC3300x A10, A11
MC3300xR A10, A11
MC93 A10, A11
PS20 A10, A11
TC21 A10, A11
TC26 A10, A11
TC52 A10, A11
TC52ax A10, A11
TC52x A10, A11
TC57 A10, A11
TC57x A10, A11
TC72 A10, A11
TC77 A10, A11
TC8300 A10, A11
VC83 8" A10, A11
VC83 11" A10, A11
WT6300 A10, A11
May 2022
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CC600 O, A11
CC6000 O, A11
EC30 O, A11
EC5x A11
ET51 O, A11
ET56 O, A11
L10A O, A11
MC20 A11
MC2200 A11
MC2700 A11
MC3300ax A11
MC3300x A11
MC3300xR A11
MC93 O, A11
PS20 O, A11
TC21 A11
TC26 A11
TC52 O, A11
TC52ax A11
TC52x A11
TC57 O, A11
TC57x A11
TC72 O, A11
TC77 O, A11
TC8300 O, A11
VC83 8" O, A11
VC83 11" A11
WT6300 A11

April 2022
Android bulletin


The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

 

CC600 O, A11
CC6000 O, A11
EC30 O, A11
EC5x A11
ET51 O, A11
ET56 O, A11
L10A O, A11
MC20 A11
MC2200 A11
MC2700 A11
MC3300ax A11
MC3300x A11
MC3300xR A11
MC93 O, A11
PS20 O, A11
TC21 A11
TC26 A11
TC52 O, A11
TC52x A11
TC57 O, A11
TC57x A11
TC72 O, A11
TC77 O, A11
TC8300 O, A11
VC83 8" O, A11
VC83 11" A11
WT6300 A11
March 2022
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CC600 A10
CC6000 A10
EC30 A10
EC5x A10
ET51 A10
ET56 A10
L10A A10
MC2700 A10
MC3300 O
MC3300R O
MC3300x A10
MC3300xR A10
MC93 A10
TC20 O
TC21 A10
TC25 O
TC26 A10
TC51 O
TC52 A10
TC52x A10
TC56 O
TC57 A10
TC57x A10
TC70x O
TC72 A10
TC75x O
TC77 A10
TC8300 A10
VC83 A10
WT6300 A10

February 2022
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CC600 O, A11
CC6000 O, A11
EC30 O, A11
EC50 O, A11
EC55 O, A11
ET51 O, A11
ET56 A11
L10A O, A11
MC20 A11
MC2200 O, A11
MC2700 O, A11
MC33ax A11
MC33x A11
MC33xR A11
MC93 A11
PS20 O, A11
TC21 O, A11
TC21 HC O, A11
TC26 O, A11
TC26 HC O, A11
TC52 O A11
TC52ax A11
TC52x O A11
TC57 O A11
TC57x O A11
TC72 O A11
TC77 O A11
TC8300 O, A11
VC8300 8" O, A11
VC8300 10" A11
WT6300 O, A11

January 2022
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CC600 A11
CC6000 A11
EC30 A11
EC50 A11
EC55 A11
ET51 A11
L10A A11
MC20 A11
MC2200 A11
MC2700 A11
MC93 A11
PS20 A11
TC21 A11
TC21 HC A11
TC26 A11
TC26 HC A11
TC8300 A11
VC8300 8" A11
VC8300 10" A11
WT6300 A11

December 2021
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CC600 A11
CC6000 A11
EC30 A11
EC50 A11
EC55 A11
ET51 A11
ET56 A11
L10A A11
MC20 A11
MC2200 A11
MC2700 A11
MC3300ax A11
MC3300x A11
MC3300xR A11
MC93 A11
PS20 A11
TC21 A11
TC21 HC A11
TC26 A11
TC26 HC A11
TC52 A11
TC52 HC A11
TC52AX A11
TC52x A11
TC52x HC A11
TC57 A11
TC57x A11
TC72 A11
TC77 A11
TC8300 A11
VC8300 8” A11
VC8300 10” A11
WT6300 A11

November 2021
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

PS20 P
TC72 P

October 2021
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CC600 O. A10, A11
CC6000 O, A10, A11
EC30 O, A10, A11
EC50 A10, A11
EC55 A10, A11
ET51 O, A10, A11
ET56 O, A10, A11
L10A O, A10, A11
MC20 A11
MC2200 A10, A11
MC2700 A10, A11
MC33ax A11
MC33x A10, A11
MC33xR A10, A11
MC9300 O, A10, A11
PS20 O, P, A10, A11
TC20 O
TC21 A10, A11
TC25 O
TC26 A10, A11
TC52 O, A10, A11
TC52ax A11
TC52x A10, A11
TC57 O, A10, A11
TC57x A10, A11
TC72 O, A10, A11
TC77 O, A10, A11
TC8300 O, A10, A11
VC8300 8" O, A10, A11
VC8300 10" A11
WT6300 A10, A11

September 2021
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CC600 Q, O, A11
CC6000 Q, O, A11
EC30 Q, O, A11
EC50 Q, A11
EC55 Q, A11
ET51 Q, O, A11
ET56 Q, O, A11
L10A Q, O, A11
MC18 L
MC20 A11
MC2200 Q, A11
MC2700 Q, A11
MC32 L
MC3300x Q, A11
MC3300xR Q, A11
MC3300ax A11
MC40 L
MC67 KK
MC92 KK
MC93 Q, O, A11
PS20 Q, O, A11
TC21 Q, A11
TC26 Q, A11
TC51 Oreo
TC52 Q, O, A11
TC52ax A11
TC52x Q, A11
TC57 Q, O, A11
TC57x Q, A11
TC72 Q, O, A11
TC77 Q, O, A11
TC8300 Q, O, A11
VC8300 8” Q, O, A11
VC8300 10” A11
WT6000 N
WT6300 Q, A11

August 2021
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC600 Q
EC30 Q
EC50 Q
EC55 Q
ET50 M
ET51 Q
ET56 Q
L10A Q
MC2200 Q
MC2700 Q
MC3300x Q
MC9300 Q
PS20 Q
TC21 Q
TC26 Q
TC52 Q
TC52x Q
TC57 Q
TC57x Q
TC70 L
TC72 Q
TC75 L
TC77 Q
TC8000 L
TC8300 Q
VC8300 Q
WT6000 N
WT6300 Q
July 2021
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CC600 R, Q
EC30 R, Q
EC50 Q
EC55 Q
ET51 Q
ET56 Q
L10A R, Q
MC2200 R, Q
MC2700 R, Q
MC3300x R, Q
MC9300 R, Q
PS20 R, Q, P
TC20 R
TC21 R, Q
TC25 R
TC26 R, Q
TC51 O
TC52 R, Q, P
TC56 O
TC57 R, Q
TC70x O
TC72 R, Q, P
TC75x O
TC77 R, Q
TC8300 R, Q
VC80x R
VC8300 R, Q
WT6300 R, Q

 

June 2021
Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

MC18 L
MC32 L
MC40 L
PS20 P
TC20 O
TC25 O
TC72 P

May 2021
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CC605 Q, O
CC610 Q, O
EC30 Q
EC50 Q
EC55 Q
ET50 M
ET51 Q, O
ET55 M
ET56 Q, O
L10A Q, O
MC18 L
MC22xx Q
MC27xx Q
MC32 L
MC33x Q
MC33 O
MC40 L
MC93 Q, O
PS20 Q, P, O
TC20 O
TC21 Q
TC25 O
TC26 Q
TC51 O
TC52 Q, P, O
TC52x Q
TC56 O
TC57 Q, O
TC57x Q
TC70 L
TC70x O
TC72 Q, P, O
TC75 L
TC75x O
TC77 Q, O
TC8000 L
TC8300 Q, L, O
VC80x O
VC83x Q, O
WT6000 N
WT6300 Q


April 2021
Android bulletin
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CC605 Q, O
CC610 Q, O
EC30 Q
EC50 Q
EC55 Q
ET50 M
ET51 Q, O
ET55 M
ET56 Q, O
L10A Q, O
MC22xx Q
MC27xx Q
MC33x Q
MC33 O
MC93 Q, O
PS20 Q, P, O
TC20 O
TC21 Q
TC25 O
TC26 Q
TC51 O
TC52 Q, P, O
TC52x Q
TC56 O
TC57 Q, O
TC57x Q
TC70 L
TC70x O
TC72 Q, P, O
TC75 L
TC75x O
TC77 Q, O
TC8300 Q, L, O
VC80x O
VC83x Q, O
WT6000 N
WT6300 Q

 

 

March
2021

Android bulletin

 

 

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. MC18 L
MC32 L
MC33 O
MC40 L
MC67 K
MC92 K
TC20 O
TC25 O
TC51 O
TC51-HC O
TC56 O
TC70 L
TC70x O
TC75 L
TC75x O
TC8000 L
VC80x O

February
2021

Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CC605 Q
CC610 Q
EC30 Q
EC50 Q
EC55 Q
ET50 M
ET51 Q
ET55 M
ET56 Q
L10A Q
MC22xx Q
MC27xx Q
MC33x Q
MC33 O
MC93 Q
PS20 Q, P
TC20 O
TC21 Q
TC25 O
TC26 Q
TC51 O
TC52 Q, P
TC52x Q
TC56 O
TC57 Q
TC57x Q
TC70 L
TC70x O
TC72 Q, P
TC75 L
TC75x O
TC77 Q
TC8300 Q, L
VC80x O
VC83x Q
WT6000 N
WT6300 Q

January
2021

Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC605 Q, O
CC610 Q, O
EC30 Q
EC50 Q
EC55 Q
ET51 Q, O
ET56 Q, O
L10A Q, O
MC22xx Q
MC27xx Q
MC33x Q
MC33 O
MC93 Q, O
PS20 Q, P, O
TC20 O
TC21 Q
TC25 O
TC26 Q
TC51 O
TC52 Q, P, O
TC56 O
TC57 Q, O
TC70x O
TC72 Q, P, O
TC75x O
TC77 Q, O
TC8300 Q, O
VC80x O
VC83x Q, O
WT6300 Q

December
2020

Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC605 Q
CC610 Q
ET51 Q
ET56 Q
L10A Q
MC33x Q
MC33 O
MC93 Q
PS20 Q
TC20 O
TC25 O
TC51 O
TC52 Q
TC56 O
TC57 Q
TC70x O
TC72 Q
TC75x O
TC77 Q
TC8300 Q
VC80x O
VC83x Q

November
2020

Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC605 Q
CC610 Q
ET51 Q
ET56 Q
L10A Q
MC33x Q
MC33 O
MC93 Q
PS20 Q
TC20 O
TC25 O
TC51 O
TC52 Q
TC56 O
TC57 Q
TC70x O
TC72 Q
TC75x O
TC77 Q
TC8300 Q
VC80x O
VC83x Q

October 2020

Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC605 O
CC610 O
ET51 O
ET56 O
L10A O
MC33 O
MC93 O
PS20 P, O
TC20 O
TC25 O
TC51 O
TC52 P, O
TC56 O
TC57 O
TC70x O
TC72 P, O
TC75x O
TC77 O
TC8300 O
VC80x O
VC83x O

September 2020

Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC605 O
CC610 O
EC30 O
ET51 O
ET56 O
L10A O
MC33 O
MC93 O
PS20 P, O
TC51 O
TC51-HC O
TC52 P, O
TC56 O
TC57 O
TC70x O
TC72 P, O
TC75x O
TC77 O
TC8300 O
VC80x O
VC83x O

August 2020

Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC605 O
CC610 O
EC30 O
ET50 M
ET51 O
ET55 M
ET56 O
L10A O
MC18 L
MC32 L
MC33 O, N
MC40 L
MC67 K
MC92 K
MC93 O
PS20 O
TC20 O
TC25 O
TC51 O, N
TC51-HC O, N
TC52 O
TC56 O
TC57 O
TC70x O, N
TC72 O
TC75x O, N
TC77 O
TC8300 O
TC8x O
VC80x O
VC83x O, N
WT6000 N, L

July 2020

Android bulletin

 

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC605 O
CC610 O
ET51 O
ET56 O
L10A O
MC33 O
MC93 O
PS20 P, O
TC20 O
TC25 O
TC51 O
TC51-HC O
TC52 P, O
TC55 K
TC56 O
TC57 O
TC70 L
TC70x O,
TC72 P, O
TC75 L
TC75x O
TC77 O
TC8300 O
TC8000 L
TC8x O
VC80x O
VC83x O

June 2020

Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC605 O
CC610 O
EC30 O
ET51 O
ET56 O
L10A O
MC33 O
MC93 O
PS20 P, O
TC20 O
TC25 O
TC51 O
TC52 P, O
TC56 O
TC57 O
TC70x O
TC72 P, O
TC75x O
TC77 O
TC8x O
TC8300 O
VC80x
VC83x O

May 2020

Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC605 O
CC610 O
ET51 O
ET56 O
L10A O
MC33 O, N
MC93 O
PS20 O
TC20 O, N
TC25 O, N
TC51 O, N
TC52 O
TC56 O, N
TC57 O
TC70x O, N
TC72 O
TC75x O, N
TC77 O
TC8x O
TC8300 O
VC80x O, N
VC83x O

April 2020

Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC605 O
CC610 O
ET51 O
ET56 O
L10A O
MC93 O
PS20 P, O
TC52 P, O
TC57 O
TC72 P, O
TC77 O
TC8x O
TC8300 O
VC83x O

March 2020

Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC605 O
CC610 O
ET51 O
ET56 O
L10A O
MC93 O
PS20 P, O
TC52 P, O
TC57 O
TC72 P, O
TC77 O
TC8x O
TC8300 O
VC83x O

February 2020

Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC605 O
CC610 O
ET51 O
ET56 O
L10A O
MC93 O
PS20 P, O
TC52 P, O
TC57 O
TC72 P, O
TC77 O
TC8x O
TC8300 O
VC83x O

January 2020

Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. ET50 M
ET55 M
ET5x P, O
CC6000 P,O
CC605 O
CC610 O
L10A P, O
MC33 O
MC33x P
MC93 P, O
PS20 P, O
TC20 O
TC25 O
TC51 O
TC52 P, O
TC56 O
TC57 P, O
TC70x O
TC72 P, O
TC75x O
TC77 P,O
TC8x O
TC8300 P, O
VC80x O
VC83x P, O

December 2019

Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.
PS20 P
TC52 P
TC72 P

November 2019

Android bulletin

The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. CC600/CC6000 O
ET50 O
ET55 O
L10A O
MC33 N
MC93 O
PS20 O
SB2 O
TC20 N
TC25 N
TC51 N
TC52 O
TC56 N
TC57 O
TC70x N
TC72 O
TC75x N
TC77 O
TC83 O
VC80x N
WT6000 L and N

Certain GPS-enabled Zebra mobile computing devices with older software images may be affected by an industry-wide change in the GPS, starting at 12:00 GMT Midnight on November 3rd, 2019.

See GPS Week Number Rollover notification for more information.

ET1 JB
MC45 WEHH 6.5
MC65 WEHH 6.5
MC67NA KK
TC55 JB
TC75 KK and L

October 2019

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 M
ET55 M
MC33 O
TC20 O
TC25 O
TC51 O
TC56 O
TC70 L
TC70x O
TC75 L
TC75X O
TC8000 L
VC80x O
WT6000 N

September 2019

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 M
ET55 M
MC18 L
MC32 L
MC33 O
MC40 L
TX20 O
TC25 O
TC51 O
TC56 O
TC70x O
TC75X O
VC80x O
WT6000 N, L

August 2019

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process.

Note: MC67 KitKat did not have a quarterly update released in August, as no critical security updates or bug fixes were applicable.

CC6000 O
MC33 O
MC93 O
PS20 O
TC20 O
TC25 O
TC51 O
TC52 O
TC56 O
TC57 O
TC72 O
TC77 O
TC70x O
TC75x O
TC8300 O
VC80x O
WT6000 N

July 2019

Android bulletin

 

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. CC6000 O
MC33 O
MC93 O
PS20 O
TC20 O
TC25 O
TC51 O
TC52 O
TC55 KK
TC56 O
TC57 O
TC70 L
TC72 O
TC75 L
TC77 O
TC70x O
TC75x O
TC8000 L
TC8300 O
VC80x O
WT6000 N

June 2019

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 M
ET55 M
MC33 O, N
PS20
TC20 O
TC25 O
TC51 O, N
TC52 O
TC56 O, N
TC57 O
TC70x O, N
TC72 O
TC75x O, N
TC77 O
VC80x O, N
WT6000 N

May 2019

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process.

Also see Google Chrome FileReader Vulnerability information

CC6000 O
MC33 O
MC67 KK
MC92 KK
MC93 O
PS20 O
TC20 O
TC25 O
TC51 O
TC52 O
TC56 O
TC57 O
TC70x O
TC75x O
TC8300 O
VC80x O
WT6000 N

 

 

April 2019

Android bulletin

 

 

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process.

Also see Google Chrome FileReader Vulnerability information

MC33 O
PS20 O
TC20 O
TC25 O
TC51 O
TC52 O
TC55 KK
TC56 O
TC70 L
TC70x O
TC72 O
TC75 L
TC77 O
TC8000 L
VC80x O
WT6000 N

March 2019

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process.

Also see Google Chrome FileReader Vulnerability information

ET50 M
ET55 M
MC33 N
TC20 N
TC25 N
TC51 M, N
TC56 M, N
TC70x M, N
TC75x M, N
VC80x N
WT6000 N

February 2019

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. MC33 O, N
MC67 KK
MC92 KK
TC20 O, N
TC25 O, N
TC51 O, N
TC56 O, N
TC70x O, N
TC75x O, N
VC80x O, N
WT6000 N

January 2019

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 M
ET55 M
MC33 N
PS20 O
TC20 O, N
TC25 N
TC51 N
TC52 O
TC57 O
TC70x N
TC72 O
TC75x N
TC77 O
VC80x N
WT6000 N

December 2018

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 L
ET55 L
MC18 L
MC33 O
MC40 L
TC20 N
TC25 N
TC51 O
TC55 L
TC56 O
TC70 L
TC70x O
TC75 L
TC75x O
TC80 L
VC80x O
WT6000 N, L

November 2018

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 M
ET55 M
MC33 N
TC20 N
TC25 N
TC51 N
TC56 N
TC70x N
TC75x N
VC80x N

October 2018

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 M
ET55 M
MC32 L
MC33 N
TC20 N
TC25 N
TC51 N
TC56 N
TC70x N
TC75x N
VC80x N
WT6000 N

September 2018

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 L
ET55 L
MC18 L
MC33 N
MC40 L
TC20 N
TC23 N
TC51 N, M
TC55 KK
TC56 N, M
TC70 L
TC70x N, M
TC75 L
TC75x N, M
TC8000 L
VC80x N
WT6000 N

August 2018

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process.
ET50 M
ET55 M
MC33 N
MC67KK
MC92KK
TC20 N
TC25 N
TC51 N
TC56 N
TC70x N
TC75x N
VC80x N
WT6000 N

July 2018

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 M
ET55 M
MC33 N
TC20 N
TC25 N
TC51 M and N
TC56 M and N
TC70x N
TC75x N
VC80x N
WT6000 N

June 2018

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 L and M
ET55 L and M
MC33 N
MC67 KK
MC92 KK
TC20 N
TC25 N
TC51 N
TC55 KK
TC56 N
TC70x N
TC75x N
VC80x N

May 2018

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 L and M
ET55 L and M
MC33 N
TC20 N
TC25 N
TC51 N
TC56 N
TC70x N
TC75x N
VC80x N
WT6000 N

April 2018

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 M
ET55 M
MC33 N
TC20 N
TC25 N
TC51 N
TC56 N
TC70x N
TC75x N
VC80x N

March 2018

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 L and M
ET55 L and M
MC18 L
MC33 N
MC40 L
MC67 KK
MC92 KK
TC51 M and N
TC55 KK
TC56 M and N
TC70 L
TC70x N
TC75 L
TC75x N
TC8000 L
VC80x N
WT6000 L

February 2018

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 L and M
ET55 L and M
MC67 KK
MC92 KK
TC20 N
TC25 N
TC51 N
TC56 N
TC70 L
TC70x M and N
TC75 L
TC75x M and N
TC8000 L
VC80x N
WT6000 L

January 2018

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process.

Please also see information for Spectre and Meltdown vulnerabilities

ET50 M
ET55 M
MC32 N
TC51 M and N
TC51-HC M and N
TC56 N
TC70 L
TC70x M and N
TC75 L
TC75x M and N
TC8000 L

December 2017

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 L and M
ET55 L and M
MC18 L
MC32 L
TC51 N
TC56 N
TC70 L
TC70x N
TC75 L
TC75x N
TC8000 L
WT6000 L

November 2017

Android bulletin

Critical severity vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. Additional updates have been made to address Krack Wi-Fi reinstallation attack vulnerability. Please see Krack information page

October 2017

Android bulletin

Critical severity vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 L and M
ET55 L and M
MC18 KK
MC40 KK and L Voice
MC40 KK FIPS
MC67 KK and FIPS KK
MC92 KK
TC51 M
TC55 KK
TC56 M
TC70 L
TC70x M
TC75 KK and L
TC75x M
TC8000 KK and L

September 2017

Android bulletin

Critical severity vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 L
ET55 L
MC18 L
MC32 L
TC51 M
TC56 M
TC70 KK and L
TC70x M
TC75 KK and L
TC75x M
TC8000 KK

August 2017

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 L
ET55 L
MC67 KK
MC92 KK
TC51 M
TC56 M
TC70 L
TC70x M
TC75 L
TC75x M
TC8000 L

July 2017

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. ET50 L
ET55 L
MC36 KK (2D)
MC40 KK and L
TC51 M
TC56 M
TC70 L
TC70x M
TC75 L
TC75x M
TC8000 L

June 2017

Android bulletin

Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to cause memory corruption during media file and data processing. ET50 L
ET55 L
MC18 L
TC51 M
TC56 M
TC70 KK
TC70x M
TC75 KK
TC75x M

May 2017

Android bulletin

Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files. ET50 L
ET55 L
MC67 KK Premium/FIPS
MC92 KK
TC51 M
TC56 M
TC70x M
TC75x M
TC8000 KK

April 2017

Android bulletin

Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files. ET50 L
ET55 L
MC40 KK Voice/FIPS
TC51 M
TC56 M
TC70x M
TC75x M

March 2017

Android bulletin

Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files. TC51 M

February 2017

Android bulletin

Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files. TC51 M

Subscribe to Zebra product software updates notification for products under a LifeGuard program.

Download the Updates 

CC6000 GMS
EC30  GMS | Non-GMS
EC50/EC55 GMS | Non-GMS
ET40 GMS | Non-GMS
ET45 GMS | Non-GMS
ET50 GMS | Non-GMS
ET51 GMS | Non-GMS
ET55 GMS | Non-GMS
ET56 GMS | Non-GMS
L10A GMS | Non-GMS
MC18 Non-GMS
MC20  GMS
MC2200  
GMS | Non-GMS
MC2700 
GMS | Non-GMS
MC32 Non-GMS
MC33  GMS | Non-GMS
MC3300R  GMS | Non-GMS
MC3300xR GMS | Non-GMS
MC3300x GMS | Non-GMS
MC3300ax GMS | Non-GMS
MC36 GMS (2D)
MC40 Voice | Non-Voice | FIPS
MC67  Premium
MC92  Premium
MC9300 GMS| Non-GMS
PS20 GMS | Non-GMS
TC15 GMS
TC20 GMS | Non-GMS
TC21 GMS | Non-GMS
TC25 GMS | Non-GMS
TC26 GMS | Non-GMS
TC51  GMS | Non-GMS
TC52  GMS | Non-GMS
TC52x  GMS | Non-GMS
TC52ax  GMS | Non-GMS
TC53 GMS | Non-GMS
TC55 
GMS | Non-GMS
TC56 GMS | Non-GMS
TC57 GMS | Non-GMS
TC57x GMS | Non-GMS
TC58 GMS
TC70 GMS | Non-GMS | GMS FIPS | Non-GMS FIPS
TC70x  GMS | Non-GMS
TC72 GMS | Non-GMS
TC73 GMS 
TC75  GMS | Non-GMS | FIPS
TC75x  GMS | Non-GMS
TC77 GMS | Non-GMS
TC78 GMS
TN28  Non-GMS
TC8000
GMS | Non-GMS | Non-GMS FIPS
TC8300 GMS | Non-GMS
VC80x GMS | Non-GMS
VC8300 GMS | Non-GMS
WT6000  Non-GMS
WT6300 GMS | Non-GMS

 

Unless otherwise noted, there have been no reports of active customer exploitation or abuse from these newly reported issues.



Are you aware of a potential security issue with a Zebra Technologies product?