Nokia X20 5G and Nokia C32 are now receiving new Android 13 Builds. Both the builds have arrived with the June security update 2023. Feature phone Nokia 225 4G is also receiving a new system update. Check below for the update size, list of markets and the update changelog for Nokia X20 5G, Nokia C32 and Nokia 225 4G.

For all software update news related to other Nokia smartphones click here. If you want to track May Security update roll-out to Nokia smartphones you can do it here.

On the basis of tips received from our readers, we will collate a list of markets for Nokia X20 5G, Nokia C32 and Nokia 225 4G in which new Android 13 builds and System update is now available. So, do let us know if you have received the update in the comments section. You can also try the VPN trick for getting the update and see if it works.

List of markets:

  • Nokia C32 in India
  • Nokia 225 4G in India
  • Nokia X20 5G in UAE

Nokia X20 5G Android 13 update size:

The update size for Nokia X20 5G is 104MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia C32 Android 13 update size:

The update size for Nokia C32 is 236MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia 225 4G system update size:

The update size for Nokia 225 4G is 40MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia X20 5G, Nokia C32 and Nokia 225 4G update changelog:

Nokia X20 5G and Nokia C32 are receiving the 2023 June Android security patch with Android 13 build V3.500 and V1.230. The official changelog however mentions generic UI enhancements and stability improvements. The system update version number for Nokia 225 4G is 19.00.17.01.

Here is what the June security update addresses as mentioned by Google on its official Security bulletin page.

The most severe of these issues is a high security vulnerability in the Framework component that could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.

Thanks Uday & Lawrence for the tip. Cheers!!