Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Android Security Update – Patch for Vulnerabilities that Allows Privilege Escalation

Posted on June 3, 2025June 3, 2025 By CWS

Google has launched a complete safety replace for Android gadgets addressing a number of high-severity vulnerabilities that might enable privilege escalation and distant code execution. 

The replace targets crucial flaws throughout main {hardware} distributors, together with Arm, Creativeness Applied sciences, and Qualcomm, with many vulnerabilities carrying CVE rankings that pose vital safety dangers to Android customers worldwide. 

This newest bulletin represents one of the crucial intensive safety patches launched this yr, addressing vulnerabilities that span throughout GPU drivers, kernel parts, and closed-source components that kind the inspiration of Android’s {hardware} abstraction layer.

The safety replace addresses a considerable variety of high-severity vulnerabilities affecting graphics processing models from main semiconductor producers. 

Vital GPU Vulnerabilities 

Arm’s Mali GPU parts are impacted by two crucial vulnerabilities: CVE-2025-0073 and CVE-2025-0819, each categorised as high-severity threats that might probably enable attackers to achieve elevated privileges via the graphics subsystem.

Creativeness Applied sciences’ PowerVR-GPU drivers face an much more intensive vulnerability panorama, with seven distinct high-severity flaws requiring speedy consideration. 

The affected CVEs embody CVE-2024-12576, CVE-2024-12837, CVE-2024-47893, CVE-2025-0468, CVE-2025-0478, CVE-2025-0835, and CVE-2025-25178. 

These vulnerabilities span completely different PowerVR-GPU implementations and will probably be exploited to execute arbitrary code with elevated permissions, making them significantly harmful for gadgets that make the most of Creativeness Applied sciences’ graphics options.

The prevalence of GPU-related vulnerabilities underscores the rising assault floor introduced by graphics drivers, which function with excessive system privileges and direct entry to {hardware}. 

Safety researchers have recognized GPU drivers as engaging targets for privilege escalation assaults as a consequence of their advanced codebase and frequent interplay with untrusted user-space functions via graphics APIs and shader compilation processes.

Qualcomm Kernel and Closed-Supply Element Flaws

Qualcomm parts current a twin problem with vulnerabilities affecting each open-source kernel components and proprietary closed-source parts. 

The kernel vulnerabilities embody CVE-2025-21424, CVE-2025-21485, and CVE-2025-21486, all categorised as high-severity threats. 

These kernel-level vulnerabilities are significantly regarding as they function on the most privileged stage of the working system and will probably enable attackers to achieve full management over affected gadgets.

The closed-source element vulnerabilities current further complexity for safety evaluation and remediation. 

Six high-severity flaws have been recognized: CVE-2024-53010, CVE-2024-53019, CVE-2024-53020, CVE-2024-53021, CVE-2024-53026, and CVE-2025-27029. 

The closed-source nature of those parts implies that detailed vulnerability info is just out there via Qualcomm’s safety bulletins, creating challenges for impartial safety evaluation and verification.

These vulnerabilities might probably have an effect on tens of millions of gadgets, making fast deployment of safety updates crucial for sustaining the safety posture of the Android ecosystem.

Machine Updates

Android machine producers should implement particular safety patch stage strings to make sure correct vulnerability protection. 

Gadgets using the 2025-06-01 safety patch stage should deal with all points related to that stage and former bulletins, whereas gadgets implementing the 2025-06-05 patch stage should embody complete fixes for all relevant vulnerabilities throughout each patch ranges. 

The construct configuration requires setting [ro.build.version.security_patch] property to both [2025-06-01] or [2025-06-05] relying on the applied patch stage.

Google has structured this bulletin with twin safety patch ranges to supply Android companions with flexibility in deployment methods whereas making certain complete safety protection. 

This strategy permits producers to prioritize crucial vulnerabilities that have an effect on broader machine populations whereas working towards full implementation of all recognized fixes. 

For gadgets working Android 10 or later, the Google Play system replace mechanism offers a further pathway for delivering safety updates with date strings matching the 2025-06-01 safety patch stage.

Velocity up and enrich risk investigations with Risk Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:Android, Escalation, Patch, Privilege, Security, Update, Vulnerabilities

Post navigation

Previous Post: Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack
Next Post: Securing Legacy Systems Strategies for Modernizing Old Tech

Related Posts

APT Group 123 Actively Attacking Windows Systems to Deliver Malicious Payloads Cyber Security News
Triple Combo – Kimsuky Hackers Attack Facebook, Email, and Telegram Users Cyber Security News
Microsoft Confirms Teams Outage for Users, Investigation Underway Cyber Security News
20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly Cyber Security News
Threat Actors Leverage Zoho WorkDrive Folder to Deliver Obfuscated PureRAT Malware Cyber Security News
Linux Kernel Patching: Preventing Exploits in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China
  • Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China
  • Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News