Article Details
Scrape Timestamp (UTC): 2025-08-05 12:42:30.181
Original Article Text
Click to Toggle View
Android gets patches for Qualcomm flaws exploited in attacks. Google has released security patches for six vulnerabilities in Android's August 2025 security update, including two Qualcomm flaws exploited in targeted attacks. The two security bugs, tracked as CVE-2025-21479 and CVE-2025-27038, were reported through the Google Android Security team in late January 2025. The first is a Graphics framework incorrect authorization weakness that can lead to memory corruption due to unauthorized command execution in the GPU micronode while executing a specific sequence of commands. CVE-2025-27038, on the other hand, is a use-after-free vulnerability that causes memory corruption while rendering graphics using Adreno GPU drivers in Chrome. Google has now integrated the patches announced by Qualcomm in June, when the wireless tech giant warned that "There are indications from Google Threat Analysis Group that CVE-2025-21479, CVE-2025-21480, CVE-2025-27038 may be under limited, targeted exploitation." "Patches for the issues affecting the Adreno Graphics Processing Unit (GPU) driver have been made available to OEMs in May together with a strong recommendation to deploy the update on affected devices as soon as possible," Qualcomm said. CISA has also added the two security bugs to its catalog of actively exploited vulnerabilities on June 3rd, ordering federal agencies to secure their devices against ongoing attacks by June 24. With this month's Android security updates, Google has also fixed a critical security vulnerability in the System component that attackers with no privileges can exploit to gain remote code execution when chained with other flaws in attacks that don't require user interaction. Google has issued two sets of security patches: the 2025-08-01 and 2025-08-05 security patch levels. The latter bundles all fixes from the first batch and patches for closed-source third-party and kernel subcomponents, which may not apply to all Android devices. While Google Pixel devices receive security updates immediately, other vendors will often take longer to test andtweak them for their specific hardware configurations. In March, Google also patched two zero-day vulnerabilities exploited in targeted attacks by Serbian authorities to unlock confiscated Android devices. Last November, the company addressed a second Android zero-day (CVE-2024-43047) used by the Serbian government in NoviSpy spyware attacks, which was first tagged as exploited by Google Project Zero in October. Red Report 2025: Analyzing the Top ATT&CK Techniques Used by 93% of Malware Malware targeting password stores surged 3X as attackers executed stealthy Perfect Heist scenarios, infiltrating and exploiting critical systems. Discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
Google released security patches addressing six vulnerabilities in its August 2025 Android update.
Two critical flaws in Qualcomm components were actively exploited in targeted attacks.
CVE-2025-21479 and CVE-2025-27038 involved memory corruption in GPU rendering and command execution.
Qualcomm had previously warned of the exploitation of these vulnerabilities and issued recommendations for OEMs to update affected devices.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) mandated federal agencies to apply these security measures by late June 2025.
Google's latest patches also fix a critical system component vulnerability enabling remote code execution without user interaction.
Android updates vary in rollout times, with Google Pixel devices receiving immediate updates, while other vendors may delay for testing and adaptations.
Previous patches in March and November addressed other zero-day vulnerabilities used by Serbian authorities in targeted spyware attacks.