Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Patches Android 0-Day Vulnerabilities Exploited in the Wild

Google Patches Android 0-Day Vulnerabilities Exploited in the Wild

Posted on December 2, 2025December 2, 2025 By CWS

Google has launched important safety updates to deal with a number of zero-day vulnerabilities affecting Android units worldwide.

The December 2025 safety bulletin reveals that menace actors are actively exploiting no less than two of those vulnerabilities in real-world assaults, prompting pressing motion from the tech big.

Vital Vulnerabilities Beneath Lively Exploitation

The 2 most regarding vulnerabilities being actively exploited are CVE-2025-48633 and CVE-2025-48572, each labeled as data disclosure (ID) points with excessive severity rankings.

These vulnerabilities reside in Android’s Framework part and require quick consideration from gadget producers and customers.

CVE-2025-48633 poses a big danger by permitting unauthorized disclosure of knowledge on affected variations of Android 13, 14, 15, and 16.

Equally, CVE-2025-48572 is assessed as a privilege escalation vulnerability that might allow attackers to realize elevated entry on susceptible units.

AspectCVE-2025-48572CVE-2025-48633Vulnerability TypeElevation of Privilege (EoP)Info Disclosure (ID)Severity RatingHighHighComponentAndroid FrameworkAndroid FrameworkAffected VersionsAndroid 13, 14, 15, 16Android 13, 14, 15, 16Impact DescriptionAllows attacker to realize elevated system privileges with out requiring extra permissionsEnables unauthorized entry to delicate gadget data and information

Most Extreme Risk: Distant Denial of Service

Whereas CVE-2025-48633 and CVE-2025-48572 signify essentially the most actively exploited threats, the safety bulletin identifies an much more important vulnerability.

CVE-2025-48631 stands out as essentially the most extreme challenge on this month’s replace, able to inflicting distant denial-of-service assaults.

What makes this vulnerability significantly harmful is that attackers want no extra execution privileges to take advantage of it, which means even unauthenticated attackers may set off it.

Google’s safety response is complete, addressing over 30 vulnerabilities throughout a number of Android parts.

Safety patch ranges resolve these points, with supply code patches to be launched to the Android Open-Supply Challenge inside 48 hours of the bulletin’s publication.

The Framework part dominates this month’s updates, with vulnerabilities together with privilege escalation flaws (CVE-2025-22420, CVE-2025-48525).

Denial-of-service points and knowledge disclosure vulnerabilities affecting Android variations 13 by 16. Google emphasizes that customers can considerably scale back their danger by quick motion.

The corporate has applied a number of layers of safety by the Android safety platform and Google Play Shield, that are enabled by default on units with Google Cell Providers.

Safety consultants advise customers to put in accessible updates instantly, significantly these utilizing Android 13, 14, 15, or 16.

Gadget producers obtained advance notification no less than one month earlier than the general public bulletin launch, permitting them time to organize patches for his or her particular units.

Android gadget homeowners ought to prioritize checking for accessible safety updates of their gadget settings. Customers can confirm their present safety patch degree by their gadget’s About Telephone part.

Instant set up of patches addressing the December 5, 2025, safety degree is strongly really useful, particularly for units that energetic exploits could goal.

Moreover, customers ought to guarantee Google Play Shield stays enabled and think about limiting app set up to the official Google Play Retailer, because the system actively displays for doubtlessly dangerous purposes which may exploit these vulnerabilities.

Cyber Security News Tags:0Day, Android, Exploited, Google, Patches, Vulnerabilities, Wild

Post navigation

Previous Post: 4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign
Next Post: Sonesta International Hotels Implements Industry-Leading Cloud Security Through AccuKnox Collaboration

Related Posts

Burger King Uses DMCA Complaint to Take Down Blog Post Detailing Security Flaws on Drive-Thru Systems Burger King Uses DMCA Complaint to Take Down Blog Post Detailing Security Flaws on Drive-Thru Systems Cyber Security News
Node.js Security Release Patches 7 Vulnerabilities Across All Release Lines Node.js Security Release Patches 7 Vulnerabilities Across All Release Lines Cyber Security News
Mongobleed PoC Exploit Tool Released for MongoDB Flaw that Exposes Sensitive Data Mongobleed PoC Exploit Tool Released for MongoDB Flaw that Exposes Sensitive Data Cyber Security News
Top 10 Best Penetration Testing as a Service (PTaaS) Companies in 2025 Top 10 Best Penetration Testing as a Service (PTaaS) Companies in 2025 Cyber Security News
Capita To pay £14 Million For Data Breach Exposes 6.6 Million Users Personal Data Capita To pay £14 Million For Data Breach Exposes 6.6 Million Users Personal Data Cyber Security News
Beware of Weaponized Google Meet page that uses ClickFix to deliver Malicious Payload Beware of Weaponized Google Meet page that uses ClickFix to deliver Malicious Payload Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News