Tablet Nokia T20 and Nokia C12 are now receiving a new Android 12 Build with security updates. Nokia G11 Plus is receiving only the May security update 2023. Check below for the update size, list of markets and the update changelog for Nokia T20, Nokia C12 and Nokia G11 Plus.

For all software update news related to other Nokia smartphones click here. If you want to track February update roll-out to Nokia smartphones you can do it here.

On the basis of tips received from our readers, we will collate a list of markets for Nokia T20, Nokia C12 and Nokia G11 Plus in which Android 12 build and/or May security update is now available. So, do let us know if you have received the update in the comments section. You can also try the VPN trick for getting the update and see if it works.

List of markets:

  • Nokia T20 in UK
  • Nokia G11 Plus and Nokia C12 in India

Nokia T20 Android 12 update size:

The update size for Nokia T20 is 30.30MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia G11 Plus & Nokia C12 update size:

The update size for Nokia G11 Plus is 38.07MB. For Nokia C12 the update size is 209MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia T20, Nokia C12 and Nokia G11 Plus update changelog:

Nokia C12 is receiving the 2023 April Android security patch with Android 12 build V1.290. Nokia T20 is receiving the 2023 May Android security patch with Android 12 build V2.380. The official changelog however mentions generic UI enhancements and stability improvements. Nokia G11 Plus is only receiving the May Security update 2023. Here is what the May 2023 security update addresses as mentioned by Google on its official Security bulletin page.

The most severe of these issues is a high security vulnerability in the Framework component that could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.

Thanks John & Uday for the tip. Cheers!!