Nokia XR20 5G and Nokia T20 Tablet are now receiving the March Security update 2023. Nokia T20 is also receiving a new Android 12 Build with the March update. The update brings only the Google Android patch update for the month of March to Nokia XR20 5G. Check below for the March Security update size, list of markets and the update changelog for Nokia XR20 5G and Nokia T20.
For all software update news related to other Nokia smartphones click here. If you want to track February update roll-out to Nokia smartphones you can do it here.
On the basis of tips received from our readers, we will collate a list of markets for Nokia XR20 5G and Nokia T20 in which March security update is now available. So, do let us know if you have received the update in the comments section. You can also try the VPN trick for getting the update and see if it works.
List of markets:
- Nokia XR20 5G in India, France
- Nokia T20 in India
Nokia T20 Android 12 + March security update size:
The update size for Nokia T20 is 49.79MB. It brings Android 12 build V2.360 along with itself. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.
Nokia XR20 5G March security update size:
The update size for Nokia XR20 5G is 95.14MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.
Nokia XR20 5G and Nokia T20 March security update changelog:
Nokia XR20 5G is receiving only the 2023 March Android security patch with the update. Nokia T20 is receiving a new Android 12 Build. The official changelog however mentions generic UI enhancements and stability improvements. Here is what the March 2023 security update addresses as mentioned by Google on its official Security bulletin page.
The most severe of these issues is a critical security vulnerability in the System component that could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.
Thanks Uday and Sam for the tip. Cheers!!