Android is Google’s mobile operating platform that is hugely popular.
Android receives a substantial numbered update from Google every year that introduces new features and other improvements for fans.
However, Google also rolls out monthly security fixes for the operating system in an effort to make it more secure.
The American tech giant recently released its February 2019 security patch that contains a fix for a “critical security vulnerability” that allowed a “remote attacker” to compromise a device in question.
Google insisted such a problem could have resulted if a user had received a “specially crafted PNG file”.
It is understood once the image had been opened, it could have had malicious consequences on the user’s smartphone.
Explaining the problem in its Android Security Bulletin, Google said: “The most severe of these issues is a critical security vulnerability in Framework that could allow a remote attacker using a specially crafted PNG file to execute arbitrary code within the context of a privileged process.
“The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.”
The issue was said to be present in Android versions from 7 Nougat to 9 Pie.
It is unknown what the exact consequences of the PNG file would be on targeted hardware.
However, it is clear once the file has been opened it would not benefit the user in question.
This means those that have not yet updated to the February 2019 security patch are at risk of the compromise.
It is worth noting Google insisted it had “no reports” of the exploitation being used on Android devices.
The American tech firm said: “We have had no reports of active customer exploitation or abuse of these newly reported issues.”
The Android February security update is currently available for Google Pixel devices in addition to the Essential Phone.
It is assumed other Android devices will receive the patch in the near future.