Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Posted on May 6, 2025May 9, 2025 By CWS

Could 06, 2025Ravie LakshmananVulnerability / Cell Safety
Google has launched its month-to-month safety updates for Android with fixes for 46 safety flaws, together with one vulnerability that it mentioned has been exploited within the wild.
The vulnerability in query is CVE-2025-27363 (CVSS rating: 8.1), a high-severity flaw within the System element that might result in native code execution with out requiring any extra execution privileges.
“Probably the most extreme of those points is a excessive safety vulnerability within the System element that might result in native code execution with no extra execution privileges wanted,” Google mentioned in a Monday advisory. “Consumer interplay isn’t wanted for exploitation.”
It is value noting that CVE-2025-27363 is rooted within the FreeType open-source font rendering library. It was first disclosed by Fb in March 2025 as having been exploited within the wild.

The shortcoming has been described as an out-of-bounds write flaw that might end in code execution when parsing TrueType GX and variable font recordsdata. The problem has been remediated in FreeType variations greater than 2.13.0.
“There are indications that CVE-2025-27363 could also be beneath restricted, focused exploitation,” Google acknowledged in its safety bulletin. The precise specifics of the assaults are presently unknown.
Google’s Could replace additionally resolves eight different flaws within the Android System and 15 flaws within the Framework module that might be abused to facilitate privilege escalation, data disclosure, and denial-of-service.
“Exploitation for a lot of points on Android is made tougher by enhancements in newer variations of the Android platform,” the corporate mentioned. “We encourage all customers to replace to the newest model of Android the place potential.”
Replace
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Tuesday added CVE-2025-27363 to its Identified Exploited Vulnerabilities (KEV) catalog, requiring federal companies to use the patches by Could 27, 2025.

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Android, Attackers, CVE202527363, Exploited, Fixes, Flaw, Google

Post navigation

Previous Post: Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence
Next Post: Entra ID Data Protection: Essential or Overkill?

Related Posts

Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android The Hacker News
MirrorFace Targets Japan and Taiwan with ROAMINGMOUSE and Upgraded ANEL Malware The Hacker News
A Technical Gap Analysis of Last-Mile Protection The Hacker News
New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors The Hacker News
Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi The Hacker News
ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybercrime-as-a-Service – Countering Accessible Hacking Tools
  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • Cybercrime-as-a-Service – Countering Accessible Hacking Tools
  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News