Nokia Mobile has started roll-out of July security update 2023 to Nokia Tablets too. Nokia T20 seems to be receiving the July security update now. Nokia G21 and Nokia G11 Plus are now receiving the June security update. The update brings only the Google Android patch update to Nokia T20, Nokia G21 and Nokia G11 Plus.

For all software update news related to other Nokia smartphones click here. If you want to track February update roll-out to Nokia smartphones you can do it here.

Check below for the Security update size, list of markets and the update changelog for Nokia T20, Nokia G21 and Nokia G11 Plus. On the basis of tips received from our readers, we will collate a list of markets for Nokia T20, Nokia G21 and Nokia G11 Plus in which latest security updates are now available. So, do let us know if you have received the update in the comments section. You can also try the VPN trick for getting the update and see if it works.

List of markets:

  • Nokia T20 in India
  • Nokia G21 in Germany
  • Nokia G11 Plus in India

Nokia T20 July security update size:

The update size for Nokia T20 is 22.35MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia G21 June security update size:

The update size for Nokia G21 is 23.77 MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia G11 Plus June security update size:

The update size for Nokia G11 Plus is 42.09MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia T20, Nokia G21 and Nokia G11 Plus security update changelog:

Nokia T20, Nokia G21 and Nokia G11 Plus are receiving only the 2023 July/June Android security patches with the updates. Here is what the July security update addresses as mentioned by Google on its official Security bulletin page.

The most severe of these issues is a critical security vulnerability in the System component that could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.

Thanks, Sven and Uday for the tip. Cheers!!

Please follow us on our new Facebook Page “NPU” by clicking here.