Lifeguard for Android Updates
LifeGuard™ for Android™ is Zebra’s software security solution that extends the lifecycle of Zebra Android enterprise mobile computers. It's a convenient way to receive extended security support, predictable periodic security updates and legacy OS security support when transitioning to a newer OS.
Device updates are an important way to keep your Android devices secure and running at their full potential. All customers are encouraged to accept these updates to their devices.
Avoid Data Loss when updating to Android 13
Read Migrating to Android 13 on TechDocs
Lifeguard Security Bulletins
Note: delivery time of security updates may vary depending on the region, product model, and third party software suppliers. While Zebra makes every attempt to align release of security updates with chipset vendor security bulletins, some patches may require additional time to ensure adequate quality review. Patches will be included in the next scheduled update as ready. Please see individual device support pages for specific guidance.
While Zebra is doing our best to deliver LifeGuard™ for Android™ security patches on a timely basis, we are experiencing delays due to COVID-19. All Zebra LifeGuard patches go through extensive testing within Zebra, are then submitted to a Google certified test laboratory for mandatory retest/verification, and then submitted to Google for final release approval. Unfortunately, many of the Google certified test laboratories have been forced to close due to COVID-19. Zebra does not yet have dates on when the test labs will re-open. Zebra will work to keep you informed as the conditions change. Zebra wishes all our customers and partners great safety and health in these challenging times.
Month | Highest Severity Update | Impacted Devices |
---|---|---|
May 2023 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. |
ET40x A11 ET45x A11 TC53 A13 TC58 A11 TC73 A13 TC78 A11 WS50 A11 |
+ Previous Android Bulletins
Month | Highest Severity Update | Impacted Devices |
---|---|---|
April 2023 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. |
CC600 A11 CC6000 A11 EC30 A11 EC50 A11 EC55 A11 ET40 A11 ET45 A11 ET51 A11 ET56 A11 L10A A11 MC20 A11 MC2200 A11 MC2700 A11 MC3300 O MC3300ax A11 MC3300R O MC3300x A11 MC3300xR A11 MC93 A11 PS20 A11 TC20 O, A11 TC25 O TC26 A11 TC26 HC A11 TC51 O TC51-HC O TC52 A11 TC52-HC A11 PS20 A11 TC52ax A11 TC52x A11 TC52x HC A11 TC56 O TC57 A11 TC57x A11 TC58 A11 TC70x O TC72 A11 TC75x O TC77 A11 TC78 A11 TC8300 A11 VC80x O VC8300 8" A11 VC8300 10" A11 WS50 A11 WT6300 A11 |
March 2023 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 A11 CC6000 A11 EC30 A11 EC50 A11 EC55 A11 ET40 A11 ET51 A11 ET56 A11 L10A A11 MC20 A11 MC2200 A11 MC2700 A11 MC3300ax A11 MC3300x A11 MC3300xR A11 MC93 A11 PS20 A11 TC15 A11 TC21 A13 TC26 A11 TC52 A11 TC52 HC A11 TC52ax A11 TC57 A11 TC57x A11 TC58 A11 TC72 A11 TC77 A11 TC78 A11 TC8300 A11 TN28 A11 VC8300 10" A11 VC8300 8" A11 WS50 A11 WT6300 A11 |
February 2023 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 A11 |
January 2023 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | EC30 A11 |
December 2022 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 A10, A11 CC6000 A10, A11 EC30 A10, A11 EC50 A10, A11 EC55 A10, A11 ET51 A10, A11 ET56 A10, A11 L10A A10, A11 MC20 A11 MC2200 A10, A11 MC2700 A10, A11 MC3300ax A11 MC3300x A10, A11 MC3300xR A10, A11 MC92 K MC93 A10, A11 PS20 A10, A11 TC21 A10, A11 TC21 HC A10, A11 TC26 A10, A11 TC26 HC A10, A11 TC52AX A11 TC52 A10, A11 TC52 HC A10, A11 TC52x A10, A11 TC53 A11 TC57 A10 TC57x A10, A11 TC58 A11 TC72 A10, A11 TC73 A11 TC77 A10, A11 TC78 A11 TC8300 A10, A11 VC8300 8" A10, A11 VC8300 10" A11 WS50 A11 WT6300 A10, A11 |
November 2022 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 A11 CC6000 A11 EC30 A11 EC50 A11 EC55 A11 ET40 A11 ET45 A11 ET51 A11 ET56 A11 L10A A11 MC20 A11 MC2200 A11 MC2700 A11 MC3300ax A11 MC3300x A11 MC3300xR A11 MC93 A11 PS20 A11 TC21 A11 TC21 HC A11 TC26 A11 TC26 HC A11 TC52 A11 TC52 HC A11 TC52AX A11 TC52x A11 TC52x HC A11 TC53 A11 TC57 A11 TC57x A11 TC58 A11 TC72 A11 TC77 A11 TC8300 A11 VC8300 8" A11 VC8300 10" A11 WS50 A11 WT6000 N WT6300 A11 |
October 2022 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 A10, A11 CC6000 A10, A11 EC30 A10, A11 EC50 A10, A11 EC55 A10, A11 ET40 A11 ET45 A11 ET51 A10, A11 ET56 A10, A11 L10A A10, A11 MC20 A11 MC2200 A10, A11 MC2700 A10, A11 MC33 O MC33R O MC3300ax A11 MC3300x A10, A11 MC3300xR A10, A11 MC93 A10, A11 TC21 A10, A11 TC21 HC A11 TC26 A10, A11 TC26 HC A11 TC20 O TC25 O TC51 O TC52 A10, A11 TC52 HC A11 TC52AX A11 TC52x A10, A11 TC52x HC A11 TC56 O TC57 A10, A11 TC57x A10, A11 TC72 A10, A11 TC77 A10, A11 TC70x O TC75x O TC8300 A10, A11 VC80x O VC8300 8" A10, A11 VC8300 10" A10, A11 WS50 A11 WT6300 A10, A11 |
September 2022 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 A10, A11 |
August 2022 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 A11 |
July 2022 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 A11 |
June 2022 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 A10, A11 CC6000 A10, A11 EC30 A10, A11 EC5x A10, A11 ET51 A10, A11 ET56 A10, A11 L10A A10, A11 MC20 A11 MC2200 A10, A11 MC2700 A10, A11 MC3300ax A10, A11 MC3300x A10, A11 MC3300xR A10, A11 MC93 A10, A11 PS20 A10, A11 TC21 A10, A11 TC26 A10, A11 TC52 A10, A11 TC52ax A10, A11 TC52x A10, A11 TC57 A10, A11 TC57x A10, A11 TC72 A10, A11 TC77 A10, A11 TC8300 A10, A11 VC83 8" A10, A11 VC83 11" A10, A11 WT6300 A10, A11 |
May 2022 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 O, A11 |
April 2022 |
|
CC600 O, A11 CC6000 O, A11 EC30 O, A11 EC5x A11 ET51 O, A11 ET56 O, A11 L10A O, A11 MC20 A11 MC2200 A11 MC2700 A11 MC3300ax A11 MC3300x A11 MC3300xR A11 MC93 O, A11 PS20 O, A11 TC21 A11 TC26 A11 TC52 O, A11 TC52x A11 TC57 O, A11 TC57x A11 TC72 O, A11 TC77 O, A11 TC8300 O, A11 VC83 8" O, A11 VC83 11" A11 WT6300 A11 |
March 2022 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 A10 |
February 2022 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 O, A11 |
January 2022 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 A11 |
December 2021 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 A11 |
November 2021 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | PS20 P |
October 2021 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 O. A10, A11 |
September 2021 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 Q, O, A11 |
August 2021 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 Q EC30 Q EC50 Q EC55 Q ET50 M ET51 Q ET56 Q L10A Q MC2200 Q MC2700 Q MC3300x Q MC9300 Q PS20 Q TC21 Q TC26 Q TC52 Q TC52x Q TC57 Q TC57x Q TC70 L TC72 Q TC75 L TC77 Q TC8000 L TC8300 Q VC8300 Q WT6000 N WT6300 Q |
July 2021 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600 R, Q |
June 2021 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | MC18 L |
May 2021 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 Q, O |
April 2021 Android bulletin |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 Q, O |
March
|
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | MC18 L MC32 L MC33 O MC40 L MC67 K MC92 K TC20 O TC25 O TC51 O TC51-HC O TC56 O TC70 L TC70x O TC75 L TC75x O TC8000 L VC80x O |
February |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 Q |
January |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 Q, O CC610 Q, O EC30 Q EC50 Q EC55 Q ET51 Q, O ET56 Q, O L10A Q, O MC22xx Q MC27xx Q MC33x Q MC33 O MC93 Q, O PS20 Q, P, O TC20 O TC21 Q TC25 O TC26 Q TC51 O TC52 Q, P, O TC56 O TC57 Q, O TC70x O TC72 Q, P, O TC75x O TC77 Q, O TC8300 Q, O VC80x O VC83x Q, O WT6300 Q |
December |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 Q CC610 Q ET51 Q ET56 Q L10A Q MC33x Q MC33 O MC93 Q PS20 Q TC20 O TC25 O TC51 O TC52 Q TC56 O TC57 Q TC70x O TC72 Q TC75x O TC77 Q TC8300 Q VC80x O VC83x Q |
November |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 Q CC610 Q ET51 Q ET56 Q L10A Q MC33x Q MC33 O MC93 Q PS20 Q TC20 O TC25 O TC51 O TC52 Q TC56 O TC57 Q TC70x O TC72 Q TC75x O TC77 Q TC8300 Q VC80x O VC83x Q |
October 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O ET51 O ET56 O L10A O MC33 O MC93 O PS20 P, O TC20 O TC25 O TC51 O TC52 P, O TC56 O TC57 O TC70x O TC72 P, O TC75x O TC77 O TC8300 O VC80x O VC83x O |
September 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O EC30 O ET51 O ET56 O L10A O MC33 O MC93 O PS20 P, O TC51 O TC51-HC O TC52 P, O TC56 O TC57 O TC70x O TC72 P, O TC75x O TC77 O TC8300 O VC80x O VC83x O |
August 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O EC30 O ET50 M ET51 O ET55 M ET56 O L10A O MC18 L MC32 L MC33 O, N MC40 L MC67 K MC92 K MC93 O PS20 O TC20 O TC25 O TC51 O, N TC51-HC O, N TC52 O TC56 O TC57 O TC70x O, N TC72 O TC75x O, N TC77 O TC8300 O TC8x O VC80x O VC83x O, N WT6000 N, L |
July 2020
|
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O ET51 O ET56 O L10A O MC33 O MC93 O PS20 P, O TC20 O TC25 O TC51 O TC51-HC O TC52 P, O TC55 K TC56 O TC57 O TC70 L TC70x O, TC72 P, O TC75 L TC75x O TC77 O TC8300 O TC8000 L TC8x O VC80x O VC83x O |
June 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O EC30 O ET51 O ET56 O L10A O MC33 O MC93 O PS20 P, O TC20 O TC25 O TC51 O TC52 P, O TC56 O TC57 O TC70x O TC72 P, O TC75x O TC77 O TC8x O TC8300 O VC80x VC83x O |
May 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O ET51 O ET56 O L10A O MC33 O, N MC93 O PS20 O TC20 O, N TC25 O, N TC51 O, N TC52 O TC56 O, N TC57 O TC70x O, N TC72 O TC75x O, N TC77 O TC8x O TC8300 O VC80x O, N VC83x O |
April 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O ET51 O ET56 O L10A O MC93 O PS20 P, O TC52 P, O TC57 O TC72 P, O TC77 O TC8x O TC8300 O VC83x O |
March 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O ET51 O ET56 O L10A O MC93 O PS20 P, O TC52 P, O TC57 O TC72 P, O TC77 O TC8x O TC8300 O VC83x O |
February 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O ET51 O ET56 O L10A O MC93 O PS20 P, O TC52 P, O TC57 O TC72 P, O TC77 O TC8x O TC8300 O VC83x O |
January 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | ET50 M ET55 M ET5x P, O CC6000 P,O CC605 O CC610 O L10A P, O MC33 O MC33x P MC93 P, O PS20 P, O TC20 O TC25 O TC51 O TC52 P, O TC56 O TC57 P, O TC70x O TC72 P, O TC75x O TC77 P,O TC8x O TC8300 P, O VC80x O VC83x P, O |
December 2019 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | PS20 P TC52 P TC72 P |
November 2019 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600/CC6000 O ET50 O ET55 O L10A O MC33 N MC93 O PS20 O SB2 O TC20 N TC25 N TC51 N TC52 O TC56 N TC57 O TC70x N TC72 O TC75x N TC77 O TC83 O VC80x N WT6000 L and N |
Certain GPS-enabled Zebra mobile computing devices with older software images may be affected by an industry-wide change in the GPS, starting at 12:00 GMT Midnight on November 3rd, 2019. See GPS Week Number Rollover notification for more information. |
ET1 JB MC45 WEHH 6.5 MC65 WEHH 6.5 MC67NA KK TC55 JB TC75 KK and L |
|
October 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC33 O TC20 O TC25 O TC51 O TC56 O TC70 L TC70x O TC75 L TC75X O TC8000 L VC80x O WT6000 N |
September 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC18 L MC32 L MC33 O MC40 L TX20 O TC25 O TC51 O TC56 O TC70x O TC75X O VC80x O WT6000 N, L |
August 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. Note: MC67 KitKat did not have a quarterly update released in August, as no critical security updates or bug fixes were applicable. |
CC6000 O MC33 O MC93 O PS20 O TC20 O TC25 O TC51 O TC52 O TC56 O TC57 O TC72 O TC77 O TC70x O TC75x O TC8300 O VC80x O WT6000 N |
July 2019
|
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | CC6000 O MC33 O MC93 O PS20 O TC20 O TC25 O TC51 O TC52 O TC55 KK TC56 O TC57 O TC70 L TC72 O TC75 L TC77 O TC70x O TC75x O TC8000 L TC8300 O VC80x O WT6000 N |
June 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC33 O, N PS20 TC20 O TC25 O TC51 O, N TC52 O TC56 O, N TC57 O TC70x O, N TC72 O TC75x O, N TC77 O VC80x O, N WT6000 N |
May 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. |
CC6000 O MC33 O MC67 KK MC92 KK MC93 O PS20 O TC20 O TC25 O TC51 O TC52 O TC56 O TC57 O TC70x O TC75x O TC8300 O VC80x O WT6000 N |
April 2019
|
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. |
MC33 O PS20 O TC20 O TC25 O TC51 O TC52 O TC55 KK TC56 O TC70 L TC70x O TC72 O TC75 L TC77 O TC8000 L VC80x O WT6000 N |
March 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. |
ET50 M ET55 M MC33 N TC20 N TC25 N TC51 M, N TC56 M, N TC70x M, N TC75x M, N VC80x N WT6000 N |
February 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | MC33 O, N MC67 KK MC92 KK TC20 O, N TC25 O, N TC51 O, N TC56 O, N TC70x O, N TC75x O, N VC80x O, N WT6000 N |
January 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC33 N PS20 O TC20 O, N TC25 N TC51 N TC52 O TC57 O TC70x N TC72 O TC75x N TC77 O VC80x N WT6000 N |
December 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L ET55 L MC18 L MC33 O MC40 L TC20 N TC25 N TC51 O TC55 L TC56 O TC70 L TC70x O TC75 L TC75x O TC80 L VC80x O WT6000 N, L |
November 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC33 N TC20 N TC25 N TC51 N TC56 N TC70x N TC75x N VC80x N |
October 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC32 L MC33 N TC20 N TC25 N TC51 N TC56 N TC70x N TC75x N VC80x N WT6000 N |
September 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L ET55 L MC18 L MC33 N MC40 L TC20 N TC23 N TC51 N, M TC55 KK TC56 N, M TC70 L TC70x N, M TC75 L TC75x N, M TC8000 L VC80x N WT6000 N |
August 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. |
ET50 M ET55 M MC33 N MC67KK MC92KK TC20 N TC25 N TC51 N TC56 N TC70x N TC75x N VC80x N WT6000 N |
July 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC33 N TC20 N TC25 N TC51 M and N TC56 M and N TC70x N TC75x N VC80x N WT6000 N |
June 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L and M ET55 L and M MC33 N MC67 KK MC92 KK TC20 N TC25 N TC51 N TC55 KK TC56 N TC70x N TC75x N VC80x N |
May 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L and M ET55 L and M MC33 N TC20 N TC25 N TC51 N TC56 N TC70x N TC75x N VC80x N WT6000 N |
April 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC33 N TC20 N TC25 N TC51 N TC56 N TC70x N TC75x N VC80x N |
March 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L and M ET55 L and M MC18 L MC33 N MC40 L MC67 KK MC92 KK TC51 M and N TC55 KK TC56 M and N TC70 L TC70x N TC75 L TC75x N TC8000 L VC80x N WT6000 L |
February 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L and M ET55 L and M MC67 KK MC92 KK TC20 N TC25 N TC51 N TC56 N TC70 L TC70x M and N TC75 L TC75x M and N TC8000 L VC80x N WT6000 L |
January 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. Please also see information for Spectre and Meltdown vulnerabilities |
ET50 M ET55 M MC32 N TC51 M and N TC51-HC M and N TC56 N TC70 L TC70x M and N TC75 L TC75x M and N TC8000 L |
December 2017 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L and M ET55 L and M MC18 L MC32 L TC51 N TC56 N TC70 L TC70x N TC75 L TC75x N TC8000 L WT6000 L |
November 2017 |
Critical severity vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. Additional updates have been made to address Krack Wi-Fi reinstallation attack vulnerability. | Please see Krack information page |
October 2017 |
Critical severity vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L and M ET55 L and M MC18 KK MC40 KK and L Voice MC40 KK FIPS MC67 KK and FIPS KK MC92 KK TC51 M TC55 KK TC56 M TC70 L TC70x M TC75 KK and L TC75x M TC8000 KK and L |
September 2017 |
Critical severity vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L ET55 L MC18 L MC32 L TC51 M TC56 M TC70 KK and L TC70x M TC75 KK and L TC75x M TC8000 KK |
August 2017 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L ET55 L MC67 KK MC92 KK TC51 M TC56 M TC70 L TC70x M TC75 L TC75x M TC8000 L |
July 2017 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L ET55 L MC36 KK (2D) MC40 KK and L TC51 M TC56 M TC70 L TC70x M TC75 L TC75x M TC8000 L |
June 2017 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to cause memory corruption during media file and data processing. | ET50 L ET55 L MC18 L TC51 M TC56 M TC70 KK TC70x M TC75 KK TC75x M |
May 2017 |
Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files. | ET50 L ET55 L MC67 KK Premium/FIPS MC92 KK TC51 M TC56 M TC70x M TC75x M TC8000 KK |
April 2017 |
Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files. | ET50 L ET55 L MC40 KK Voice/FIPS TC51 M TC56 M TC70x M TC75x M |
March 2017 |
Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files. | TC51 M |
February 2017 |
Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files. | TC51 M |
Subscribe to Zebra product software updates notification for products under a LifeGuard program.
Download the Updates
CC6000 GMS
EC30 GMS | Non-GMS
EC50/EC55 GMS | Non-GMS
ET40 GMS | Non-GMS
ET45 GMS | Non-GMS
ET50 GMS | Non-GMS
ET51 GMS | Non-GMS
ET55 GMS | Non-GMS
ET56 GMS | Non-GMS
L10A GMS | Non-GMS
MC18 Non-GMS
MC20 GMS
MC2200 GMS | Non-GMS
MC2700 GMS | Non-GMS
MC32 Non-GMS
MC33 GMS | Non-GMS
MC3300R GMS | Non-GMS
MC3300xR GMS | Non-GMS
MC3300x GMS | Non-GMS
MC3300ax GMS | Non-GMS
MC36 GMS (2D)
MC40 Voice | Non-Voice | FIPS
MC67 Premium
MC92 Premium
MC9300 GMS| Non-GMS
PS20 GMS | Non-GMS
TC15 GMS
TC20 GMS | Non-GMS
TC21 GMS | Non-GMS
TC25 GMS | Non-GMS
TC26 GMS | Non-GMS
TC51 GMS | Non-GMS
TC52 GMS | Non-GMS
TC52x GMS | Non-GMS
TC52ax GMS | Non-GMS
TC53 GMS | Non-GMS
TC55 GMS | Non-GMS
TC56 GMS | Non-GMS
TC57 GMS | Non-GMS
TC57x GMS | Non-GMS
TC58 GMS
TC70 GMS | Non-GMS | GMS FIPS | Non-GMS FIPS
TC70x GMS | Non-GMS
TC72 GMS | Non-GMS
TC73 GMS
TC75 GMS | Non-GMS | FIPS
TC75x GMS | Non-GMS
TC77 GMS | Non-GMS
TC78 GMS
TN28 Non-GMS
TC8000 GMS | Non-GMS | Non-GMS FIPS
TC8300 GMS | Non-GMS
VC80x GMS | Non-GMS
VC8300 GMS | Non-GMS
WT6000 Non-GMS
WT6300 GMS | Non-GMS
Unless otherwise noted, there have been no reports of active customer exploitation or abuse from these newly reported issues.
Are you aware of a potential security issue with a Zebra Technologies product?