Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Over 30 Vulnerabilities Patched in Android

Posted on June 3, 2025June 3, 2025 By CWS

Google’s newest updates for the Android working system patch greater than 30 vulnerabilities, all labeled as ‘excessive severity’.

The June 2025 Android safety bulletin reveals that probably the most severe flaw, in keeping with Google, is CVE-2025-26443, a neighborhood privilege escalation problem within the System element. Exploitation doesn’t require further privileges, however person interplay is required.

Vulnerabilities that may result in DoS assaults, privilege escalation, or data disclosure have been patched in Android’s Framework, System, and Runtime elements, in addition to in third-party elements from Arm and Creativeness Applied sciences.

The newest Android updates additionally deal with a number of high-severity vulnerabilities found in Qualcomm elements. 

Nonetheless, the listing of Qualcomm element CVEs doesn’t embody CVE-2025-21479, CVE-2025-21480 and CVE-2025-27038, which Qualcomm disclosed on Monday, warning clients about their malicious exploitation.

The three zero-day vulnerabilities have been noticed in focused assaults by Google’s personal Menace Evaluation Group, however apparently the patches have but to make it to the Android OS.

Prior to now, a few of the Qualcomm chipset vulnerabilities found by Google researchers had been leveraged in spyware and adware campaigns.  

The newest Android updates shall be pushed out by smartphone makers reminiscent of LGE, Motorola and Samsung to their very own customers. Nonetheless, to this point solely Motorola has revealed an advisory for the newest vulnerabilities. Google has but to publish its month-to-month advisory for Pixel telephones.  Commercial. Scroll to proceed studying.

Associated: Google Ships Android ‘Superior Safety’ Mode to Thwart Surveillance Adware

Associated: Android Replace Patches FreeType Vulnerability Exploited as Zero-Day

Associated: Android Replace Patches Two Exploited Vulnerabilities

Security Week News Tags:Android, Patched, Vulnerabilities

Post navigation

Previous Post: Understanding Help Desk Scams and How to Defend Your Organization
Next Post: MainStreet Bank Data Breach Impacts Customer Payment Cards 

Related Posts

In Other News: FBI Warns of BadBox 2, NSO Disputes WhatsApp Fine, 1,000 Leave CISA Security Week News
161,000 People Impacted by Krispy Kreme Data Breach Security Week News
Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack Security Week News
United Natural Foods Projects Up to $400M Sales Hit from June Cyberattack Security Week News
Canadian Airline WestJet Hit by Cyberattack Security Week News
Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China
  • Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China
  • Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News