Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Posted on May 6, 2025May 9, 2025 By CWS

Could 06, 2025Ravie LakshmananVulnerability / Cell Safety
Google has launched its month-to-month safety updates for Android with fixes for 46 safety flaws, together with one vulnerability that it mentioned has been exploited within the wild.
The vulnerability in query is CVE-2025-27363 (CVSS rating: 8.1), a high-severity flaw within the System element that might result in native code execution with out requiring any extra execution privileges.
“Probably the most extreme of those points is a excessive safety vulnerability within the System element that might result in native code execution with no extra execution privileges wanted,” Google mentioned in a Monday advisory. “Consumer interplay isn’t wanted for exploitation.”
It is value noting that CVE-2025-27363 is rooted within the FreeType open-source font rendering library. It was first disclosed by Fb in March 2025 as having been exploited within the wild.

The shortcoming has been described as an out-of-bounds write flaw that might end in code execution when parsing TrueType GX and variable font recordsdata. The problem has been remediated in FreeType variations greater than 2.13.0.
“There are indications that CVE-2025-27363 could also be beneath restricted, focused exploitation,” Google acknowledged in its safety bulletin. The precise specifics of the assaults are presently unknown.
Google’s Could replace additionally resolves eight different flaws within the Android System and 15 flaws within the Framework module that might be abused to facilitate privilege escalation, data disclosure, and denial-of-service.
“Exploitation for a lot of points on Android is made tougher by enhancements in newer variations of the Android platform,” the corporate mentioned. “We encourage all customers to replace to the newest model of Android the place potential.”
Replace
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Tuesday added CVE-2025-27363 to its Identified Exploited Vulnerabilities (KEV) catalog, requiring federal companies to use the patches by Could 27, 2025.

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Android, Attackers, CVE202527363, Exploited, Fixes, Flaw, Google

Post navigation

Previous Post: Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence
Next Post: Entra ID Data Protection: Essential or Overkill?

Related Posts

A Technical Gap Analysis of Last-Mile Protection The Hacker News
How to Automate CVE and Vulnerability Advisory Response with Tines The Hacker News
Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data The Hacker News
Why Offensive Security Training Benefits Your Entire Security Team The Hacker News
Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware The Hacker News
New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News