Lifeguard for Android Updates
LifeGuard™ for Android™ is Zebra’s software security solution that extends the lifecycle of Zebra Android enterprise mobile computers. It's a convenient way to receive extended security support, predictable periodic security updates and legacy OS security support when transitioning to a newer OS.
Device updates are an important way to keep your Android devices secure and running at their full potential. All customers are encouraged to accept these updates to their devices.
Lifeguard Security Bulletins
Note: delivery time of security updates may vary depending on the region, product model, and third party software suppliers. While Zebra makes every attempt to align release of security updates with chipset vendor security bulletins, some patches may require additional time to ensure adequate quality review. Patches will be included in the next scheduled update as ready. Please see individual device support pages for specific guidance.
While Zebra is doing our best to deliver LifeGuard™ for Android™ security patches on a timely basis, we are experiencing delays due to COVID-19. All Zebra LifeGuard patches go through extensive testing within Zebra, are then submitted to a Google certified test laboratory for mandatory retest/verification, and then submitted to Google for final release approval. Unfortunately, many of the Google certified test laboratories have been forced to close due to COVID-19. Zebra does not yet have dates on when the test labs will re-open. Zebra will work to keep you informed as the conditions change. Zebra wishes all our customers and partners great safety and health in these challenging times.
Month | Highest Severity Update | Impacted Devices |
---|---|---|
February |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 Q |
January |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 Q, O CC610 Q, O EC30 Q EC50 Q EC55 Q ET51 Q, O ET56 Q, O L10A Q, O MC22xx Q MC27xx Q MC33x Q MC33 O MC93 Q, O PS20 Q, P, O TC20 O TC21 Q TC25 O TC26 Q TC51 O TC52 Q, P, O TC56 O TC57 Q, O TC70x O TC72 Q, P, O TC75x O TC77 Q, O TC8300 Q, O VC80x O VC83x Q, O WT6300 Q |
December |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 Q CC610 Q ET51 Q ET56 Q L10A Q MC33x Q MC33 O MC93 Q PS20 Q TC20 O TC25 O TC51 O TC52 Q TC56 O TC57 Q TC70x O TC72 Q TC75x O TC77 Q TC8300 Q VC80x O VC83x Q |
November |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 Q CC610 Q ET51 Q ET56 Q L10A Q MC33x Q MC33 O MC93 Q PS20 Q TC20 O TC25 O TC51 O TC52 Q TC56 O TC57 Q TC70x O TC72 Q TC75x O TC77 Q TC8300 Q VC80x O VC83x Q |
October 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O ET51 O ET56 O L10A O MC33 O MC93 O PS20 P, O TC20 O TC25 O TC51 O TC52 P, O TC56 O TC57 O TC70x O TC72 P, O TC75x O TC77 O TC8300 O VC80x O VC83x O |
September 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O EC30 O ET51 O ET56 O L10A O MC33 O MC93 O PS20 P, O TC51 O TC51-HC O TC52 P, O TC56 O TC57 O TC70x O TC72 P, O TC75x O TC77 O TC8300 O VC80x O VC83x O |
August 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O EC30 O ET50 M ET51 O ET55 M ET56 O L10A O MC18 L MC32 L MC33 O, N MC40 L MC67 K MC92 K MC93 O PS20 O TC20 O TC25 O TC51 O, N TC51-HC O, N TC52 O TC56 O TC57 O TC70x O, N TC72 O TC75x O, N TC77 O TC8300 O TC8x O VC80x O VC83x O, N WT6000 N, L |
July 2020
|
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O ET51 O ET56 O L10A O MC33 O MC93 O PS20 P, O TC20 O TC25 O TC51 O TC51-HC O TC52 P, O TC55 K TC56 O TC57 O TC70 L TC70x O, TC72 P, O TC75 L TC75x O TC77 O TC8300 O TC8000 L TC8x O VC80x O VC83x O |
June 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O EC30 O ET51 O ET56 O L10A O MC33 O MC93 O PS20 P, O TC20 O TC25 O TC51 O TC52 P, O TC56 O TC57 O TC70x O TC72 P, O TC75x O TC77 O TC8x O TC8300 O VC80x VC83x O |
May 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O ET51 O ET56 O L10A O MC33 O, N MC93 O PS20 O TC20 O, N TC25 O, N TC51 O, N TC52 O TC56 O, N TC57 O TC70x O, N TC72 O TC75x O, N TC77 O TC8x O TC8300 O VC80x O, N VC83x O |
April 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O ET51 O ET56 O L10A O MC93 O PS20 P, O TC52 P, O TC57 O TC72 P, O TC77 O TC8x O TC8300 O VC83x O |
March 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O ET51 O ET56 O L10A O MC93 O PS20 P, O TC52 P, O TC57 O TC72 P, O TC77 O TC8x O TC8300 O VC83x O |
February 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC605 O CC610 O ET51 O ET56 O L10A O MC93 O PS20 P, O TC52 P, O TC57 O TC72 P, O TC77 O TC8x O TC8300 O VC83x O |
January 2020 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | ET50 M ET55 M ET5x P, O CC6000 P,O CC605 O CC610 O L10A P, O MC33 O MC33x P MC93 P, O PS20 P, O TC20 O TC25 O TC51 O TC52 P, O TC56 O TC57 P, O TC70x O TC72 P, O TC75x O TC77 P,O TC8x O TC8300 P, O VC80x O VC83x P, O |
December 2019 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | PS20 P TC52 P TC72 P |
November 2019 |
The most severe vulnerability this month could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions. | CC600/CC6000 O ET50 O ET55 O L10A O MC33 N MC93 O PS20 O SB2 O TC20 N TC25 N TC51 N TC52 O TC56 N TC57 O TC70x N TC72 O TC75x N TC77 O TC83 O VC80x N WT6000 L and N |
Certain GPS-enabled Zebra mobile computing devices with older software images may be affected by an industry-wide change in the GPS, starting at 12:00 GMT Midnight on November 3rd, 2019. See GPS Week Number Rollover notification for more information. |
ET1 JB MC45 WEHH 6.5 MC65 WEHH 6.5 MC67NA KK TC55 JB TC75 KK and L |
|
October 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC33 O TC20 O TC25 O TC51 O TC56 O TC70 L TC70x O TC75 L TC75X O TC8000 L VC80x O WT6000 N |
September 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC18 L MC32 L MC33 O MC40 L TX20 O TC25 O TC51 O TC56 O TC70x O TC75X O VC80x O WT6000 N, L |
August 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. Note: MC67 KitKat did not have a quarterly update released in August, as no critical security updates or bug fixes were applicable. |
CC6000 O MC33 O MC93 O PS20 O TC20 O TC25 O TC51 O TC52 O TC56 O TC57 O TC72 O TC77 O TC70x O TC75x O TC8300 O VC80x O WT6000 N |
July 2019
|
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | CC6000 O MC33 O MC93 O PS20 O TC20 O TC25 O TC51 O TC52 O TC55 KK TC56 O TC57 O TC70 L TC72 O TC75 L TC77 O TC70x O TC75x O TC8000 L TC8300 O VC80x O WT6000 N |
June 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC33 O, N PS20 TC20 O TC25 O TC51 O, N TC52 O TC56 O, N TC57 O TC70x O, N TC72 O TC75x O, N TC77 O VC80x O, N WT6000 N |
May 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. |
CC6000 O MC33 O MC67 KK MC92 KK MC93 O PS20 O TC20 O TC25 O TC51 O TC52 O TC56 O TC57 O TC70x O TC75x O TC8300 O VC80x O WT6000 N |
April 2019
|
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. |
MC33 O PS20 O TC20 O TC25 O TC51 O TC52 O TC55 KK TC56 O TC70 L TC70x O TC72 O TC75 L TC77 O TC8000 L VC80x O WT6000 N |
March 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. |
ET50 M ET55 M MC33 N TC20 N TC25 N TC51 M, N TC56 M, N TC70x M, N TC75x M, N VC80x N WT6000 N |
February 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | MC33 O, N MC67 KK MC92 KK TC20 O, N TC25 O, N TC51 O, N TC56 O, N TC70x O, N TC75x O, N VC80x O, N WT6000 N |
January 2019 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC33 N PS20 O TC20 O, N TC25 N TC51 N TC52 O TC57 O TC70x N TC72 O TC75x N TC77 O VC80x N WT6000 N |
December 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L ET55 L MC18 L MC33 O MC40 L TC20 N TC25 N TC51 O TC55 L TC56 O TC70 L TC70x O TC75 L TC75x O TC80 L VC80x O WT6000 N, L |
November 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC33 N TC20 N TC25 N TC51 N TC56 N TC70x N TC75x N VC80x N |
October 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC32 L MC33 N TC20 N TC25 N TC51 N TC56 N TC70x N TC75x N VC80x N WT6000 N |
September 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L ET55 L MC18 L MC33 N MC40 L TC20 N TC23 N TC51 N, M TC55 KK TC56 N, M TC70 L TC70x N, M TC75 L TC75x N, M TC8000 L VC80x N WT6000 N |
August 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. |
ET50 M ET55 M MC33 N MC67KK MC92KK TC20 N TC25 N TC51 N TC56 N TC70x N TC75x N VC80x N WT6000 N |
July 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC33 N TC20 N TC25 N TC51 M and N TC56 M and N TC70x N TC75x N VC80x N WT6000 N |
June 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L and M ET55 L and M MC33 N MC67 KK MC92 KK TC20 N TC25 N TC51 N TC55 KK TC56 N TC70x N TC75x N VC80x N |
May 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L and M ET55 L and M MC33 N TC20 N TC25 N TC51 N TC56 N TC70x N TC75x N VC80x N WT6000 N |
April 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 M ET55 M MC33 N TC20 N TC25 N TC51 N TC56 N TC70x N TC75x N VC80x N |
March 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L and M ET55 L and M MC18 L MC33 N MC40 L MC67 KK MC92 KK TC51 M and N TC55 KK TC56 M and N TC70 L TC70x N TC75 L TC75x N TC8000 L VC80x N WT6000 L |
February 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L and M ET55 L and M MC67 KK MC92 KK TC20 N TC25 N TC51 N TC56 N TC70 L TC70x M and N TC75 L TC75x M and N TC8000 L VC80x N WT6000 L |
January 2018 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. Please also see information for Spectre and Meltdown vulnerabilities |
ET50 M ET55 M MC32 N TC51 M and N TC51-HC M and N TC56 N TC70 L TC70x M and N TC75 L TC75x M and N TC8000 L |
December 2017 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L and M ET55 L and M MC18 L MC32 L TC51 N TC56 N TC70 L TC70x N TC75 L TC75x N TC8000 L WT6000 L |
November 2017 |
Critical severity vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. Additional updates have been made to address Krack Wi-Fi reinstallation attack vulnerability. | Please see Krack information page |
October 2017 |
Critical severity vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L and M ET55 L and M MC18 KK MC40 KK and L Voice MC40 KK FIPS MC67 KK and FIPS KK MC92 KK TC51 M TC55 KK TC56 M TC70 L TC70x M TC75 KK and L TC75x M TC8000 KK and L |
September 2017 |
Critical severity vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L ET55 L MC18 L MC32 L TC51 M TC56 M TC70 KK and L TC70x M TC75 KK and L TC75x M TC8000 KK |
August 2017 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L ET55 L MC67 KK MC92 KK TC51 M TC56 M TC70 L TC70x M TC75 L TC75x M TC8000 L |
July 2017 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. | ET50 L ET55 L MC36 KK (2D) MC40 KK and L TC51 M TC56 M TC70 L TC70x M TC75 L TC75x M TC8000 L |
June 2017 |
Critical security vulnerability in media framework that could enable a remote attacker using a specially crafted file to cause memory corruption during media file and data processing. | ET50 L ET55 L MC18 L TC51 M TC56 M TC70 KK TC70x M TC75 KK TC75x M |
May 2017 |
Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files. | ET50 L ET55 L MC67 KK Premium/FIPS MC92 KK TC51 M TC56 M TC70x M TC75x M TC8000 KK |
April 2017 |
Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files. | ET50 L ET55 L MC40 KK Voice/FIPS TC51 M TC56 M TC70x M TC75x M |
March 2017 |
Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files. | TC51 M |
February 2017 |
Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files. | TC51 M |
Subscribe to Zebra product software updates notification for products under a LifeGuard program.
Unless otherwise noted, there have been no reports of active customer exploitation or abuse from these newly reported issues.
Are you aware of a potential security issue with a Zebra Technologies product?