Google has launched a complete safety replace for Android gadgets addressing a number of high-severity vulnerabilities that might enable privilege escalation and distant code execution.
The replace targets crucial flaws throughout main {hardware} distributors, together with Arm, Creativeness Applied sciences, and Qualcomm, with many vulnerabilities carrying CVE rankings that pose vital safety dangers to Android customers worldwide.
This newest bulletin represents one of the crucial intensive safety patches launched this yr, addressing vulnerabilities that span throughout GPU drivers, kernel parts, and closed-source components that kind the inspiration of Android’s {hardware} abstraction layer.
The safety replace addresses a considerable variety of high-severity vulnerabilities affecting graphics processing models from main semiconductor producers.
Vital GPU Vulnerabilities
Arm’s Mali GPU parts are impacted by two crucial vulnerabilities: CVE-2025-0073 and CVE-2025-0819, each categorised as high-severity threats that might probably enable attackers to achieve elevated privileges via the graphics subsystem.
Creativeness Applied sciences’ PowerVR-GPU drivers face an much more intensive vulnerability panorama, with seven distinct high-severity flaws requiring speedy consideration.
The affected CVEs embody CVE-2024-12576, CVE-2024-12837, CVE-2024-47893, CVE-2025-0468, CVE-2025-0478, CVE-2025-0835, and CVE-2025-25178.
These vulnerabilities span completely different PowerVR-GPU implementations and will probably be exploited to execute arbitrary code with elevated permissions, making them significantly harmful for gadgets that make the most of Creativeness Applied sciences’ graphics options.
The prevalence of GPU-related vulnerabilities underscores the rising assault floor introduced by graphics drivers, which function with excessive system privileges and direct entry to {hardware}.
Safety researchers have recognized GPU drivers as engaging targets for privilege escalation assaults as a consequence of their advanced codebase and frequent interplay with untrusted user-space functions via graphics APIs and shader compilation processes.
Qualcomm Kernel and Closed-Supply Element Flaws
Qualcomm parts current a twin problem with vulnerabilities affecting each open-source kernel components and proprietary closed-source parts.
The kernel vulnerabilities embody CVE-2025-21424, CVE-2025-21485, and CVE-2025-21486, all categorised as high-severity threats.
These kernel-level vulnerabilities are significantly regarding as they function on the most privileged stage of the working system and will probably enable attackers to achieve full management over affected gadgets.
The closed-source element vulnerabilities current further complexity for safety evaluation and remediation.
Six high-severity flaws have been recognized: CVE-2024-53010, CVE-2024-53019, CVE-2024-53020, CVE-2024-53021, CVE-2024-53026, and CVE-2025-27029.
The closed-source nature of those parts implies that detailed vulnerability info is just out there via Qualcomm’s safety bulletins, creating challenges for impartial safety evaluation and verification.
These vulnerabilities might probably have an effect on tens of millions of gadgets, making fast deployment of safety updates crucial for sustaining the safety posture of the Android ecosystem.
Machine Updates
Android machine producers should implement particular safety patch stage strings to make sure correct vulnerability protection.
Gadgets using the 2025-06-01 safety patch stage should deal with all points related to that stage and former bulletins, whereas gadgets implementing the 2025-06-05 patch stage should embody complete fixes for all relevant vulnerabilities throughout each patch ranges.
The construct configuration requires setting [ro.build.version.security_patch] property to both [2025-06-01] or [2025-06-05] relying on the applied patch stage.
Google has structured this bulletin with twin safety patch ranges to supply Android companions with flexibility in deployment methods whereas making certain complete safety protection.
This strategy permits producers to prioritize crucial vulnerabilities that have an effect on broader machine populations whereas working towards full implementation of all recognized fixes.
For gadgets working Android 10 or later, the Google Play system replace mechanism offers a further pathway for delivering safety updates with date strings matching the 2025-06-01 safety patch stage.
Velocity up and enrich risk investigations with Risk Intelligence Lookup! -> 50 trial search requests