Nokia G20, Nokia 5.3 and Nokia 3.4 too are receiving the February Security update 2023 now. The update brings only the Google Android patch update for the month of February 2023 to all these smartphones. Check below for the February Security update size, list of markets and the update changelog for Nokia G20, Nokia 5.3 and Nokia 3.4.

For all software update news related to other Nokia smartphones click here. If you want to track February update roll-out to Nokia smartphones you can do it here.

On the basis of tips received from our readers, we will collate a list of markets for Nokia G20, Nokia 5.3 and Nokia 3.4 in which February security update is now available. So, do let us know if you have received the update in the comments section. You can also try the VPN trick for getting the update and see if it works.

List of markets:

  • Nokia G20 in Serbia, Poland
  • Nokia 3.4 and Nokia 5.3 in Sri India

Nokia G20 February security update size:

The update size for Nokia G20 is 25.99 MB depending upon markets. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia 5.3 and Nokia 3.4 February security update size:

The update size for Nokia 5.3 and Nokia 3.4 is not known. If you have a screenshot for this update you can share in the comment section below. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia G20, Nokia 5.3 and Nokia 3.4 February security update changelog:

Nokia G20, Nokia 5.3 and Nokia 3.4 are receiving only the 2023 February Android security patch with the update. Here is what the February security update addresses as mentioned by Google on its official Security bulletin page.

The most severe of these issues is a high security vulnerability in the Framework component that could lead to local escalation of privilege with no additional execution privileges needed. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.

Thanks, Kristijan, Vivek & Tejas for the tip. Cheers!!