Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack

Posted on September 3, 2025September 3, 2025 By CWS

In response to the invention of actively exploited 0-day vulnerabilities, Google has launched its September 2025 Android Safety Bulletin, rolling out patch stage 2025-09-05 to safeguard thousands and thousands of units.

The bulletin particulars crucial points in each System and Kernel elements, and emphasizes the significance of quick updates to mitigate distant code execution dangers.

Key Takeaways1. Patch 2025-09-05 fixes CVE-2025-38352 (zero-interaction RCE) and CVE-2025-48543 (kernel EoP).2. System bug wants no person motion; kernel bug grants root.3. Replace now; AOSP supply in 48 hrs.

Crucial System Element RCE Vulnerability 

The flagship repair addresses CVE-2025-38352, a zero-interaction flaw within the Android System element that enables distant (proximal/adjoining) code execution with none elevated privileges. 

Google’s severity evaluation charges this as Crucial, noting that profitable exploitation may grant attackers full management of affected units even with platform and repair mitigations enabled in growth environments. 

No person engagement, comparable to clicking a hyperlink or opening a file, is required to set off the exploit.

Supply code patches for CVE-2025-38352 are actually obtainable within the Android Open Supply Mission (AOSP) repository.

Google plans to replace the bulletin with direct AOSP hyperlinks inside 48 hours of publication.

Excessive-Severity Elevation of Privilege Flaw

One other patch targets CVE-2025-48543, an Elevation of Privilege (EoP) vulnerability within the Android Kernel. 

Rated Excessive, this flaw may enable native code to achieve root-level permissions, bypassing SELinux insurance policies and different kernel-level safeguards. 

Affected variations embody Android 13, 14, 15, and 16. Companions have obtained notification of each points over a month prematurely, guaranteeing OEMs can combine the required kernel patches into upcoming gadget updates.

CVETitleSeverityCVE-2025-38352Remote (proximal/adjoining) code execution in System element, zero-interactionCriticalCVE-2025-48543Elevation of Privilege in Kernel, bypass SELinux to achieve rootHigh

Customers are strongly suggested to confirm their patch stage is at the very least 2025-09-05 and to use updates instantly.

Android companions have been briefed, and AOSP supply code updates will likely be launched shortly.

This coordinated effort underscores Google’s dedication to proactive vulnerability administration and fast response to rising threats. 

Customers and gadget producers alike should prioritize this replace to take care of the integrity of Android’s safety posture.

Discover this Story Fascinating! Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:0Day, Actively, Android, Attack, Exploited, Patch, Security, Update, Vulnerabilities

Post navigation

Previous Post: CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks
Next Post: Security Firms Hit by Salesforce–Salesloft Drift Breach

Related Posts

Detecting and Remediating Misconfigurations in Cloud Environments Cyber Security News
Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone Cyber Security News
Top 5 Best Cybersecurity Companies Leading The Industry Right Now in 2025 Cyber Security News
Windows 11 Gets New AI-Powered Features Cyber Security News
Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code Cyber Security News
Endpoint Security Reimagined EDR vs XDR Comparison Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use Browser Extensions Safely
  • Chess.com Data Breach – Hackers Breached External Systems and Gained Internal Access
  • Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries
  • GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module
  • Tycoon Phishing Kit Employs New Technique to Hide Malicious Links

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use Browser Extensions Safely
  • Chess.com Data Breach – Hackers Breached External Systems and Gained Internal Access
  • Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries
  • GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module
  • Tycoon Phishing Kit Employs New Technique to Hide Malicious Links

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News