Tag Android

Android Security Update: Google Addresses 120 Vulnerabilities, Including Two Actively Exploited Zero-Days

Sep 03, 2025
Mobile Security / Vulnerability

Google has released security updates for September 2025, patching 120 vulnerabilities in its Android operating system. Among these are two critical issues that have been confirmed as actively exploited in targeted attacks. The key vulnerabilities are:

  • CVE-2025-38352 (CVSS score: 7.4): A privilege escalation flaw in the Linux Kernel component.
  • CVE-2025-48543 (CVSS score: 7.4): A privilege escalation flaw in the Android Runtime component.

Both vulnerabilities allow for local privilege escalation without requiring additional execution privileges or user interaction. While Google has not detailed how these vulnerabilities are being exploited in the wild or if they are being leveraged together, they acknowledge signs of “limited, targeted exploitation.” Benoît Sevens from Google’s Threat Analysis Group (TAG) is credited with discovering and reporting these critical flaws.

Android Security Alert: Google Addresses 120 Security Vulnerabilities, Including Two Active Zero-Days In a significant update as part of its September 2025 security patch cycle, Google has addressed a total of 120 security vulnerabilities affecting its Android operating system. Among these, two particular flaws have raised alarm due to their…

Read More

Android Security Update: Google Addresses 120 Vulnerabilities, Including Two Actively Exploited Zero-Days

Sep 03, 2025
Mobile Security / Vulnerability

Google has released security updates for September 2025, patching 120 vulnerabilities in its Android operating system. Among these are two critical issues that have been confirmed as actively exploited in targeted attacks. The key vulnerabilities are:

  • CVE-2025-38352 (CVSS score: 7.4): A privilege escalation flaw in the Linux Kernel component.
  • CVE-2025-48543 (CVSS score: 7.4): A privilege escalation flaw in the Android Runtime component.

Both vulnerabilities allow for local privilege escalation without requiring additional execution privileges or user interaction. While Google has not detailed how these vulnerabilities are being exploited in the wild or if they are being leveraged together, they acknowledge signs of “limited, targeted exploitation.” Benoît Sevens from Google’s Threat Analysis Group (TAG) is credited with discovering and reporting these critical flaws.

WhatsApp Image Filter Vulnerability May Have Exposed User Data to Remote Attacks

A recently patched high-severity security flaw in WhatsApp’s image filter feature posed a serious risk of allowing malicious images to extract sensitive information from the app’s memory. Identified as CVE-2020-1910 (CVSS score: 7.8), this vulnerability involved out-of-bounds read/write errors that could be exploited by applying specific filters to a crafted image before sending it to an unsuspecting recipient, enabling attackers to access critical data. According to WhatsApp’s advisory from February 2021, “A missing bounds check in WhatsApp for Android prior to version 2.21.1.13 and WhatsApp Business prior to the same version could have led to this vulnerability.” The issue was reported to the Facebook-owned platform by cybersecurity firm Check Point Research on November 10, 2020.

WhatsApp Photo Filter Vulnerability Could Have Exposed User Data to Remote Threats On September 2, 2021, it was revealed that a significant security flaw in WhatsApp’s image-filtering capability posed a risk of data exposure to unauthorized remote attackers. This vulnerability, designated CVE-2020-1910 and assigned a CVSS score of 7.8, was…

Read More

WhatsApp Image Filter Vulnerability May Have Exposed User Data to Remote Attacks

A recently patched high-severity security flaw in WhatsApp’s image filter feature posed a serious risk of allowing malicious images to extract sensitive information from the app’s memory. Identified as CVE-2020-1910 (CVSS score: 7.8), this vulnerability involved out-of-bounds read/write errors that could be exploited by applying specific filters to a crafted image before sending it to an unsuspecting recipient, enabling attackers to access critical data. According to WhatsApp’s advisory from February 2021, “A missing bounds check in WhatsApp for Android prior to version 2.21.1.13 and WhatsApp Business prior to the same version could have led to this vulnerability.” The issue was reported to the Facebook-owned platform by cybersecurity firm Check Point Research on November 10, 2020.

South Korea Faces Android Trojan Threats, Malware in Gaming Apps, and DDoS Assaults

Oct 25, 2013

Last Tuesday, the National Police Agency of South Korea issued a warning about the proliferation of malware-infected video games available in the South Korean market, designed to facilitate cyberattacks against the country. This malware collects users’ location data and IP addresses, reportedly transmitting the information to servers based in North Korea.

Today, AhnLab, South Korea’s leading antivirus company, confirmed that they have detected distributed denial-of-service (DDoS) attacks targeting the websites of local businesses. The report indicates that approximately 16 websites belonging to 13 companies, including Daum, MSN, and the JoongAng Ilbo newspaper, have been affected. AhnLab noted that around 10,000 computers were compromised, primarily due to the failure to install or update antivirus programs since the last cyberattack in July. The attack was first identified around 4:00 p.m. on Thursday, impacting roughly 10,000 systems.

South Korea Faces Cyber Threats: Android Trojan, Malware in Gaming Apps, and DDoS Attacks On October 25, 2013, South Korea’s National Police Agency issued a stark warning regarding an alarming emergence of malware-laden video games infiltrating local markets. These applications are believed to serve as conduits for orchestrated cyber attacks…

Read More

South Korea Faces Android Trojan Threats, Malware in Gaming Apps, and DDoS Assaults

Oct 25, 2013

Last Tuesday, the National Police Agency of South Korea issued a warning about the proliferation of malware-infected video games available in the South Korean market, designed to facilitate cyberattacks against the country. This malware collects users’ location data and IP addresses, reportedly transmitting the information to servers based in North Korea.

Today, AhnLab, South Korea’s leading antivirus company, confirmed that they have detected distributed denial-of-service (DDoS) attacks targeting the websites of local businesses. The report indicates that approximately 16 websites belonging to 13 companies, including Daum, MSN, and the JoongAng Ilbo newspaper, have been affected. AhnLab noted that around 10,000 computers were compromised, primarily due to the failure to install or update antivirus programs since the last cyberattack in July. The attack was first identified around 4:00 p.m. on Thursday, impacting roughly 10,000 systems.

Google Alerts on Active Exploitation of New Android Zero-Day Vulnerability

November 3, 2021

Google has released its latest monthly security updates for Android, addressing 39 vulnerabilities, including a zero-day exploit that is currently being targeted in limited attacks. Identified as CVE-2021-1048, this zero-day flaw is characterized as a use-after-free vulnerability in the kernel, which could allow local privilege escalation. Use-after-free vulnerabilities pose significant risks, enabling attackers to access or reference memory that has already been freed. This could lead to a “write-what-where” scenario, allowing arbitrary code execution and potential control over a victim’s device. “There are indications that CVE-2021-1048 may be under limited, targeted exploitation,” Google stated in its November advisory, while withholding specific technical details about the exploit, the nature of the attacks, and the identities of any potential perpetrators. The security patch also addresses two critical vulnerabilities among the other fixes.

Google Alerts on Newly Discovered Android Zero-Day Exploited in Targeted Attacks November 3, 2021 Google has announced the release of its monthly security updates for the Android operating system, which include fixes for 39 vulnerabilities. Among these is a critical zero-day vulnerability identified as CVE-2021-1048, which the company has confirmed…

Read More

Google Alerts on Active Exploitation of New Android Zero-Day Vulnerability

November 3, 2021

Google has released its latest monthly security updates for Android, addressing 39 vulnerabilities, including a zero-day exploit that is currently being targeted in limited attacks. Identified as CVE-2021-1048, this zero-day flaw is characterized as a use-after-free vulnerability in the kernel, which could allow local privilege escalation. Use-after-free vulnerabilities pose significant risks, enabling attackers to access or reference memory that has already been freed. This could lead to a “write-what-where” scenario, allowing arbitrary code execution and potential control over a victim’s device. “There are indications that CVE-2021-1048 may be under limited, targeted exploitation,” Google stated in its November advisory, while withholding specific technical details about the exploit, the nature of the attacks, and the identities of any potential perpetrators. The security patch also addresses two critical vulnerabilities among the other fixes.

New Ransomware Poses Risk of Exposing Your Online Activity and Private Photos to Friends

In recent developments following notorious ransomware threats like WannaCry and Petya, a sophisticated new strain of malware has emerged, specifically targeting Android users through deceptive applications on the Google Play Store. This new malware, known as LeakerLocker, diverges from conventional ransomware methods by not encrypting files. Instead, it stealthily gathers…

Read MoreNew Ransomware Poses Risk of Exposing Your Online Activity and Private Photos to Friends

BankBot Makes Its Comeback on the Play Store: The Ongoing Android Malware Saga

Despite ongoing efforts by Google to secure its Play Store against malware, new threats continue to exploit vulnerabilities in its defenses. Recent investigations by various cybersecurity firms have unveiled two notable malware campaigns, one of which disseminates an updated variant of the notorious **BankBot** trojan that mimics legitimate banking applications…

Read MoreBankBot Makes Its Comeback on the Play Store: The Ongoing Android Malware Saga

Microsoft Releases Patches for 80 Vulnerabilities, Including Two Currently Under Attack

In its March 2023 Patch Tuesday update, Microsoft disclosed fixes for 80 security vulnerabilities, two of which have been actively exploited in the wild. These vulnerabilities target critical components within the Microsoft ecosystem, with eight categorized as Critical, 71 as Important, and one as Moderate in severity. This update continues…

Read MoreMicrosoft Releases Patches for 80 Vulnerabilities, Including Two Currently Under Attack

Android Vulnerability Allows Hackers to Inject Malware into Apps Without Modifying Signatures

A newly uncovered vulnerability dubbed “Janus” poses a significant threat to millions of Android devices, allowing attackers to overwrite legitimate applications with harmful malware without altering their signature verification. This critical flaw enables malicious updates to be distributed that maintain the appearance and functionality of the original applications. The vulnerability,…

Read MoreAndroid Vulnerability Allows Hackers to Inject Malware into Apps Without Modifying Signatures

Spyware Vendors Exposed for Exploiting Zero-Day Vulnerabilities in Android and iOS Devices

Recent investigations by Google’s Threat Analysis Group (TAG) have uncovered the exploitation of several zero-day vulnerabilities last year, employed by commercial spyware vendors to target mobile devices on both Android and iOS platforms. These two separate yet focused campaigns exploited the vulnerability gap that occurs between the announcement of fixes…

Read MoreSpyware Vendors Exposed for Exploiting Zero-Day Vulnerabilities in Android and iOS Devices