Home News Nokia 5.4 & Nokia 3.4 receive (Android 12 Build) March Security update...

Nokia 5.4 & Nokia 3.4 receive (Android 12 Build) March Security update 2023 now (Markets)

0

Nokia 5.4 and Nokia 3.4 are now receiving March security update 2023. Both the smartphones are also receiving new Android 12 builds along with the Android patch for March 2023. Check below for the update size, list of markets and the update changelog for Nokia 5.4 and Nokia 3.4.

For all software update news related to other Nokia smartphones click here. If you want to track February update roll-out to Nokia smartphones you can do it here.

On the basis of tips received from our readers, we will collate a list of markets for Nokia 5.4 and Nokia 3.4 in which March security update is now available. So, do let us know if you have received the update in the comments section. You can also try the VPN trick for getting the update and see if it works.

List of markets:

  • Nokia 5.4 in India
  • Nokia 3.4 in India

Nokia 3.4 Android 12 + March security update size:

The update size for Nokia 3.4 is 56.7MB. It brings Android 12 build V3.500 along with itself. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia 5.4 Android 12 + March security update size:

The update size for Nokia 5.4 is 57.28MB. It brings Android 12 build V3.460 along with itself. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia 5.4 and Nokia 3.4 March security update changelog:

Nokia 5.4 and Nokia 3.4 are receiving the 2023 March Android security patch with a new Android 12 Build. The official changelog however mentions generic UI enhancements and stability improvements. Here is what the March 2023 security update addresses as mentioned by Google on its official Security bulletin page.

The most severe of these issues is a critical security vulnerability in the System component that could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.

Thanks Tejas & Arman for the tip. Cheers!!

Exit mobile version