Nokia Mobile has now expanded release of December security update to Tablets. Both Nokia T21 and Nokia T20 are receiving a new Android 12 build with December Security update now. Check below for the December Security update size, list of markets and the update changelog for Nokia T21 and Nokia T20.
For all software update news related to other Nokia smartphones click here. If you want to track November security update roll-out to Nokia smartphones you can do it here.
On the basis of tips received from our readers, we will collate a list of markets for Nokia T21 and Nokia T20, where the new Android 12 build and December security update is now available. So, do let us know if you have received the update in the comments section. You can also try the VPN trick for getting the update and see if it works.
List of markets:
- Nokia T21 in France
- Nokia T20 in Australia and Egypt
Nokia T21 Android 12 + December security update size:
Nokia T21 is receiving a new Android 12 Build V1.190 with the December security update (35.81 MB in size depending upon markets). You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.
Nokia T20 Android 12 + December security update size:
Nokia T20 is receiving a new Android 12 Build V2.310 with the December security update (367 MB in size depending upon markets). You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.
Nokia T21 and Nokia T20 update changelog:
Both Nokia T21 and Nokia T20 are receiving a new Android 12 Build along with the 2022 December Android security update. The changelog for new builds mentions the generic “improved system stability” and “UI enhancements”. Here is what the December security update addresses as mentioned by Google on its official Security bulletin page.
The most severe of these issues is a critical security vulnerability in the System component that could lead to remote code execution over Bluetooth with no additional execution privileges needed. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.
Thanks, MickyB Aus, SamFichier and Hotlain for the tip. Cheers!!