Nokia X20 5G and Nokia X10 5G are now receiving new Android 13 Builds. The update also brings the Google Android patch update for the month of February 2023. Nokia X20 5G and Nokia X10 5G are two of the five Nokia smartphones which have received Android 13 upgrades so far.

Read our Android 13 update coverage by clicking here. Check below for the Android 13 build and February Security update size, list of markets and the update changelog for Nokia X20 5G and Nokia X10 5G.

For all software update news related to other Nokia smartphones click here. If you want to track February update roll-out to Nokia smartphones you can do it here.

On the basis of tips received from our readers, we will collate a list of markets for Nokia X20 5G and Nokia X10 5G in which February security update is now available. So, do let us know if you have received the update in the comments section. You can also try the VPN trick for getting the update and see if it works.

List of markets:

  • Nokia X10 5G in UAE

Nokia X20 5G February security update size:

The update size for Nokia X20 5G is 388MB. The Android 13 Build number is V3.470. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia X10 5G February security update size:

The update size for Nokia X10 5G is 389MB. The Android 13 Build number is V3.370. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia X20 5G and Nokia X10 5G update changelog:

Nokia X20 5G and Nokia X10 5G are receiving new Android 13 Builds along with the 2023 February Android security update. The changelog for new builds mentions the generic “improved system stability” and “UI enhancements”. Here is what the February security update addresses as mentioned by Google on its official Security bulletin page.

The most severe of these issues is a high security vulnerability in the Framework component that could lead to local escalation of privilege with no additional execution privileges needed. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.

Thanks, Lawrence & Uday for the tip. Cheers!!