Home News Nokia 8.3 5G & Nokia 2.4 receive (Android 12 Build) March Security...

Nokia 8.3 5G & Nokia 2.4 receive (Android 12 Build) March Security update 2023 now (Markets)

0

Nokia 8.3 5G and Nokia 2.4 are now receiving March security update 2023. Nokia 2.4 is also receiving a new Android 12 builds along with the Android patch for March 2023. Check below for the update size, list of markets and the update changelog for Nokia 8.3 5G and Nokia 2.4.

For all software update news related to other Nokia smartphones click here. If you want to track February update roll-out to Nokia smartphones you can do it here.

On the basis of tips received from our readers, we will collate a list of markets for Nokia 8.3 5G and Nokia 2.4 in which March security update is now available. So, do let us know if you have received the update in the comments section. You can also try the VPN trick for getting the update and see if it works.

List of markets:

  • Nokia 8.3 5G in UK, Finland
  • Nokia 2.4 in France

Nokia 2.4 Android 12 + March security update size:

The update size for Nokia 2.4 is 32.96MB. It brings Android 12 build V3.470 along with itself. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia 8.3 5G March security update size:

The update size for Nokia 8.3 5G is 56.90MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia 8.3 5G and Nokia 2.4 March security update changelog:

Nokia 2.4 is receiving the 2023 March Android security patch with a new Android 12 Build. The official changelog however mentions generic UI enhancements and stability improvements. Nokia 8.3 5G is only getting the Android security patch for the month of March. Here is what the March 2023 security update addresses as mentioned by Google on its official Security bulletin page.

The most severe of these issues is a critical security vulnerability in the System component that could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.

Thanks NokiaTracker_, Matti and Luke for the tip. Cheers!!

Exit mobile version