Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of Android 0-Day Vulnerability Exploited in Attacks

Posted on December 3, 2025December 3, 2025 By CWS

CISA has added two important Android Framework vulnerabilities to its Identified Exploited Vulnerabilities catalog, signaling lively exploitation within the wild.

The vulnerabilities have an effect on the Android OS and pose vital dangers to hundreds of thousands of cellular units worldwide.

CISA added the vulnerabilities to its KEV catalog on December 2, 2025, requiring federal businesses and significant infrastructure operators to use patches by December 23, 2025.

The 2 vulnerabilities are CVE-2025-48572, an Android Framework privilege escalation flaw, and CVE-2025-48633, an info disclosure vulnerability in the identical framework part.

Vulnerabilities Added to Identified Exploited Checklist

CVE-2025-48572 is a privilege escalation vulnerability within the Android Framework that might enable risk actors to realize elevated permissions on compromised units.

The vulnerability’s unspecified nature suggests Google remains to be withholding technical particulars to forestall widespread exploitation earlier than patches change into obtainable.

As soon as an attacker features privilege escalation, they’ll set up malware, entry delicate person information, or set up persistent backdoors on affected units.

The second vulnerability, CVE-2025-48633, allows info disclosure assaults by the Android Framework.

CVE IDVulnerability TypeComponentStatusCVE-2025-48572Privilege EscalationAndroid FrameworkActive ExploitationCVE-2025-48633Information DisclosureAndroid FrameworkActive Exploitation

This flaw may enable attackers to extract delicate information from affected units with out requiring express person interplay.

When mixed with privilege escalation vulnerabilities, info disclosure flaws create a strong assault chain that may compromise machine safety completely.

Neither vulnerability has been confirmed to be used in ransomware campaigns presently. Nonetheless, CISA’s determination so as to add them to the KEV catalog signifies lively exploitation.

Risk actors concentrating on Android units typically exploit a number of vulnerabilities to maximise assault success charges, making speedy patching important for machine homeowners and enterprise directors.

CISA recommends organizations take speedy motion by making use of vendor-supplied mitigations as quickly as patches change into obtainable.

Federal businesses should adjust to the December 23 deadline per binding operational directive BOD 22-01.

Organizations unable to use patches ought to contemplate discontinuing use of affected merchandise or implementing extra compensating safety controls to scale back publicity.

Cellular machine customers ought to allow automated safety updates on their Android units and test Google Play System Replace settings for pending patches.

Enterprise directors ought to prioritize deploying Android safety updates throughout company-owned units and talk patch availability to customers.

Moreover, organizations ought to monitor for indicators of compromise associated to those vulnerabilities and implement community segmentation to restrict lateral motion if compromise happens.

The Android safety panorama continues evolving as risk actors develop subtle assault chains concentrating on cellular platforms.

This newest CISA advisory underscores the significance of sustaining machine safety by common patching, safety monitoring, and immediate incident response capabilities.

Organizations ought to deal with this advisory with excessive urgency and prioritize remediation efforts accordingly.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:0Day, Android, Attacks, CISA, Exploited, Vulnerability, Warns

Post navigation

Previous Post: Arizona Attorney General Sues Chinese Online Retailer Temu Over Data Theft Claims
Next Post: Critical King Addons Vulnerability Exploited to Hack WordPress Sites

Related Posts

Lite XL Text editor Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
UAT-638 Hackers Exploit Cityworks Zero-Day to Attack IIS Servers With VSHell Malware Cyber Security News
Cavalry Werewolf Attacking Government Organizations to Deploy Backdoor For Network Access Cyber Security News
New Research Uncovers Connection Between VPN Apps and Multiple Security Vulnerabilities Cyber Security News
11 Best Cloud Access Security Broker Software (CASB) Cyber Security News
IT Giant Ingram Micro Restores Operations Following Ransomware Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark