Nokia 3.4 & Nokia 5.4 receiving new Android 12 build & December Security update 2022 now


Nokia Mobile has extended its December security update release to more smartphones. Both Nokia 3.4 and Nokia 5.4 receive new Android 12 builds with December security updates. For Nokia 3.4 and Nokia 5.4 December security update size, market list, and changelog for the update, please check below.

Click here for all software update news related to other Nokia smartphones. If you want to track the rollout of November security updates to Nokia smartphones, you can do so here.

Based on tips from our readers, we’ve put together a list of Nokia 3.4 and Nokia 5.4 markets where new Android 12 builds and December security updates are available. So let us know if you receive any updates in the comments section. You can also try our VPN trick to get updates and see if that works for you.

Market list:

  • Nokia 3.4 in India and Egypt
  • Nokia 5.4 in India and Egypt

Nokia 3.4 Android 12 + December security update size:

Nokia 3.4 receives new Android 12 build V3.40 with December security updates (452 ​​MB in size depending on market). You will be prompted to download this update or[設定]You can check for updates by going to and searching for system updates.

Nokia 5.4 android 12+ December security update size:

Nokia 5.4 receives new Android 12 build V3.380 with December security updates (1.8GB and 132MB sizes depending on market). You will be prompted to download this update or[設定]You can check for updates by going to and searching for system updates.

Nokia 3.4 & Nokia 5.4 update changelog:

Both Nokia 3.4 and Nokia 5.4 will receive new Android 12 builds along with the December 2022 Android Security Update. The changelog for the new build lists general “system stability improvements” and “UI enhancements”. Here’s what Google has to say about his December security update on its official security bulletin page:

The most severe of these issues is a critical security vulnerability in a system component that could allow remote code execution over Bluetooth without additional execution privileges. The severity rating is based on the impact that exploitation of the vulnerability might have on affected devices if the platform and services mitigations were turned off for development purposes or were successfully bypassed. Based on

Thanks to Rupam and Hotlain for the hint. cheers! !


Leave a Reply

Your email address will not be published. Required fields are marked *