Home News Nokia X10 5G receives new Android 13 Build, Nokia 8.3 5G only...

Nokia X10 5G receives new Android 13 Build, Nokia 8.3 5G only April security update [Markets]

2

Nokia X10 5G and Nokia 8.3 5G are now receiving April security update 2023. Nokia X10 5G is also receiving a new Android 13 Build. Check below for the update size, list of markets and the update changelog for Nokia X10 5G and Nokia 8.3 5G.

For all software update news related to other Nokia smartphones click here. If you want to track February update roll-out to Nokia smartphones you can do it here.

On the basis of tips received from our readers, we will collate a list of markets for Nokia X10 5G and Nokia 8.3 5G in which Android 13 build and April security update is now available. So, do let us know if you have received the update in the comments section. You can also try the VPN trick for getting the update and see if it works.

List of markets:

  • Nokia 8.3 5G in Austria
  • Nokia X10 5G in UAE

Nokia 8.3 5G April security update size:

The update size for Nokia 8.3 5G is 58.56MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia X10 5G Android 13 + April security update size:

The update size for Nokia X10 5G is 452MB. It brings Android 13 build V3.380 along with itself. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia X10 5G and Nokia 8.3 5G update changelog:

Nokia X10 5G is receiving the 2023 April Android security patch with a new Android 13 Build. The official changelog however mentions generic UI enhancements and stability improvements. Nokia 8.3 5G is only receiving the April Security update. Here is what the April 2023 security update addresses as mentioned by Google on its official Security bulletin page.

The most severe of these issues is a critical security vulnerability in the System component that could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.

Thanks Dorso & Lawrence for the tip. Cheers!!

Exit mobile version