The Nokia T20 Tablet is now receiving the official Android 13 update in more markets. The new Android 13 update build comes with September Security update for all markets.

Nokia has also continued the roll-out of September security update 2023 to Nokia 2.4. The security update brings only the Google Android patch for the month of September.

Nokia T20 Android 13 update size and markets:

As per tip received from our readers the Android 13 update for Nokia T20 is available in Egypt now. The update however was available in many markets already.

The Android 13 Build V3.270 comes with Android September security patch update for Nokia T20. The update is a huge 2.74GB in size.

The Android 13 OS update brings some new features and visual changes, usability enhancements along with security and privacy improvements.

You can check our curated list of Android 13 eligible Nokia smartphones and Tablets by clicking here. Watch the new Android 13 features and changes in action on a Nokia smartphone in our hands-on video.

Check below for the September Security update size, list of markets and the update changelog for Nokia 2.4. On the basis of tips received from our readers, we will collate a list of markets for Nokia 2.4 in which updates are now available. So, do let us know if you have received the update in the comments section. You can also try the VPN trick for getting the update and see if it works.

List of markets:

  • Nokia 2.4 in France

Nokia 2.4 September security update size:

The update size for Nokia 2.4 is 25.88MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia 2.4 September update changelog:

Nokia 2.4 is receiving only the 2023 September Android security patch with the update. Here is what the September security update addresses as mentioned by Google on its official Security bulletin page.

The most severe of these issues is a critical security vulnerability in the System component that could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.

Thanks Hotlain & NokiaTracker_ for the tip. Cheers!!

Please follow us on our new Facebook Page “NPU” by clicking here.