Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability

Posted on August 5, 2025August 5, 2025 By CWS

Google on Monday introduced a recent set of safety updates for Android that deal with six vulnerabilities within the working system and third-party elements, together with an exploited Qualcomm flaw.

The exploited bug, disclosed in early June and tracked as CVE‑2025‑27038 (CVSS rating of seven.5), is described as a use-after-free subject when rendering graphics utilizing Adreno GPU drivers in Chrome.

“There are indications from Google Menace Evaluation Group that CVE-2025-21479, CVE-2025-21480, CVE-2025-27038 could also be underneath restricted, focused exploitation,” Qualcomm stated on June 2. The US cybersecurity company CISA added all three to the KEV catalog the subsequent day.

In Could, Qualcomm shipped patches for all three safety defects to OEMs and cellphone makers, however Google’s June Android patches didn’t embrace fixes for them, and no safety patch was rolled out in July, for the primary time in a decade.

Whereas no particulars on the noticed exploitation of CVE‑2025‑27038 have been shared publicly, Qualcomm’s phrasing and the earlier exploitation of bugs in its chipsets counsel that it may need been focused by a industrial adware vendor.

Essentially the most extreme of the 5 remaining flaws within the August 2025 Android safety bulletin is a critical-severity distant code execution (RCE) subject within the System element, tracked as CVE‑2025‑48530, which will be exploited with out consumer interplay.

“Essentially the most extreme of those points is a essential safety vulnerability within the System element that might result in distant code execution together with different bugs, with no extra execution privileges wanted,” Google notes.

The primary a part of Android’s August 2025 replace arrives on gadgets because the 2025-08-01 safety patch stage and resolves the System safety defect, together with two high-severity elevation of privilege (EoP) vulnerabilities within the Framework element.Commercial. Scroll to proceed studying.

The second half arrives because the 2025-08-05 safety patch stage and addresses one flaw in Arm elements and two points in Qualcomm elements, together with the exploited bug.

“We urge organizations to make sure all managed Android gadgets are promptly up to date to the 2025‑08‑05 safety patch stage (or newer) in order that they aren’t uncovered. This month’s bulletin reinforces the precept that even smaller updates can shut pathways utilized by expert risk actors – staying forward requires proactivity, not complacency,” Jamf senior safety technique supervisor Adam Boynton stated.

No safety patches have been included within the August 2025 safety bulletins for Android Automotive OS and Put on OS, and Google has but to publish a Pixel safety bulletin for this month.

Associated: Apple Patches Safari Vulnerability Flagged as Exploited Towards Chrome

Associated: SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation

Associated: Nvidia Triton Vulnerabilities Pose Large Danger to AI Fashions

Associated: Samsung Pronounces Safety Enhancements for Galaxy Smartphones

Security Week News Tags:Androids, August, Exploited, Patches, Qualcomm, Update, Vulnerability

Post navigation

Previous Post: Famous Chollima APT Hackers Attacking Job Seekers and Organization to Deploy JavaScript Based Malware
Next Post: How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents

Related Posts

CPAP Medical Data Breach Impacts 90,000 People Security Week News
Legitimate Shellter Pen-Testing Tool Used in Malware Attacks Security Week News
Cisco Patches Critical ISE Vulnerability With Public PoC Security Week News
North Korean Hackers Use Fake Zoom Updates to Install macOS Malware Security Week News
Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks Security Week News
Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Heathrow and Other European Airports Hit by Cyberattack, Several Flights Delayed
  • First-ever AI-powered ‘MalTerminal’ Malware uses OpenAI GPT-4 to Generate Ransomware Code
  • Top Zero-Day Vulnerabilities Exploited in the Wild in 2025
  • LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer
  • Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Heathrow and Other European Airports Hit by Cyberattack, Several Flights Delayed
  • First-ever AI-powered ‘MalTerminal’ Malware uses OpenAI GPT-4 to Generate Ransomware Code
  • Top Zero-Day Vulnerabilities Exploited in the Wild in 2025
  • LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer
  • Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News