Android Security Update: Google Addresses 120 Vulnerabilities, Including Two Actively Exploited Zero-Days
Sep 03, 2025
Mobile Security / Vulnerability
Google has released security updates for September 2025, patching 120 vulnerabilities in its Android operating system. Among these are two critical issues that have been confirmed as actively exploited in targeted attacks. The key vulnerabilities are:
- CVE-2025-38352 (CVSS score: 7.4): A privilege escalation flaw in the Linux Kernel component.
- CVE-2025-48543 (CVSS score: 7.4): A privilege escalation flaw in the Android Runtime component.
Both vulnerabilities allow for local privilege escalation without requiring additional execution privileges or user interaction. While Google has not detailed how these vulnerabilities are being exploited in the wild or if they are being leveraged together, they acknowledge signs of “limited, targeted exploitation.” Benoît Sevens from Google’s Threat Analysis Group (TAG) is credited with discovering and reporting these critical flaws.
Mobile Security / Vulnerability
Android Security Alert: Google Addresses 120 Security Vulnerabilities, Including Two Active Zero-Days In a significant update as part of its September 2025 security patch cycle, Google has addressed a total of 120 security vulnerabilities affecting its Android operating system. Among these, two particular flaws have raised alarm due to their…
Android Security Update: Google Addresses 120 Vulnerabilities, Including Two Actively Exploited Zero-Days
Sep 03, 2025
Mobile Security / Vulnerability
Google has released security updates for September 2025, patching 120 vulnerabilities in its Android operating system. Among these are two critical issues that have been confirmed as actively exploited in targeted attacks. The key vulnerabilities are:
- CVE-2025-38352 (CVSS score: 7.4): A privilege escalation flaw in the Linux Kernel component.
- CVE-2025-48543 (CVSS score: 7.4): A privilege escalation flaw in the Android Runtime component.
Both vulnerabilities allow for local privilege escalation without requiring additional execution privileges or user interaction. While Google has not detailed how these vulnerabilities are being exploited in the wild or if they are being leveraged together, they acknowledge signs of “limited, targeted exploitation.” Benoît Sevens from Google’s Threat Analysis Group (TAG) is credited with discovering and reporting these critical flaws.