Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of Android 0-Day Use-After-Free Vulnerability Exploited in Attacks

Posted on September 5, 2025September 5, 2025 By CWS

CISA has issued an pressing alert relating to a zero-day vulnerability within the Android working system that’s being actively exploited in real-world assaults.

The vulnerability, recognized as CVE-2025-48543, is a high-severity subject that might enable attackers to achieve elevated management over affected units.

On Thursday, September 4, 2025, CISA added the vulnerability to its Identified Exploited Vulnerabilities (KEV) catalog, signaling a confirmed and ongoing risk to customers.

The vulnerability is described as a use-after-free vulnerability throughout the Android Runtime (ART), the core part liable for executing purposes on Android units.

A malicious actor can exploit such a reminiscence corruption bug to bypass the strong safety confines of the Chrome browser sandbox, leading to native privilege escalation.

Android 0-Day Use-After-Free Vulnerability

A profitable exploit would successfully grant an attacker higher-level permissions on the machine, remodeling a low-privilege compromise into a big system-wide breach. This might allow them to put in persistent malware, entry delicate consumer information, or take additional management of the compromised machine.

Based on the data launched by CISA, the precise risk actors or the character of the campaigns leveraging this exploit, corresponding to its use in ransomware assaults, are at the moment unknown.

Nonetheless, the inclusion within the KEV catalog confirms that safety researchers have noticed energetic exploitation within the wild, that means attackers had been utilizing the flaw earlier than a patch was publicly out there.

In response to the energetic risk, CISA has issued a binding operational directive to all Federal Civilian Government Department (FCEB) companies. These companies are required to use the mandatory mitigations as instructed by the seller by a deadline of September 25, 2025.

If patches are usually not out there, companies are instructed to discontinue using the product to forestall potential compromise.

Google has addressed the vulnerability in its September 2025 Android Safety Bulletin, launched on September 1. CISA’s advisory urges all organizations, in addition to particular person Android customers, to prioritize putting in this safety replace as quickly as it’s made out there by their machine producer.

Given the severity of a privilege escalation flaw, all Android customers are strongly inspired to verify for and apply the newest system updates instantly. To take action, customers can usually navigate to Settings > System > System replace.

Immediate patching stays probably the most crucial protection in opposition to vulnerabilities which can be being actively utilized in cyberattacks.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:0Day, Android, Attacks, CISA, Exploited, UseAfterFree, Vulnerability, Warns

Post navigation

Previous Post: North Korean Hackers Targeted Hundreds in Fake Job Interview Attacks
Next Post: SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild

Related Posts

CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits Cyber Security News
F5 Fixes HTTP/2 Vulnerability Enabling Massive DoS Attacks Cyber Security News
New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data Cyber Security News
New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP Cyber Security News
Axis Camera Server Vulnerabilities Exposes Thousands of Organizations to Attack Cyber Security News
Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload
  • Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys
  • Kali Linux vs Parrot OS
  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload
  • Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys
  • Kali Linux vs Parrot OS
  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News