Article Details
Scrape Timestamp (UTC): 2025-12-02 18:50:54.694
Source: https://www.theregister.com/2025/12/02/android_0_days/
Original Article Text
Click to Toggle View
Two Android 0-day bugs disclosed and fixed, plus 105 more to patch. Christmas comes early for attackers this year. Two high-severity Android bugs were exploited as zero-days before Google issued a fix, according to its December Android security bulletin. The two vulnerabilities are CVE-2025-48633, an information-disclosure flaw in Android's framework component, and CVE-2025-48572, an elevation-of-privilege bug also in the framework component. Both are ranked high severity, and according to Google, both "may be under limited, targeted exploitation." Both of these – plus an additional 105 security holes – all have patches, so it's a good idea to update your Android software ASAP. Google didn't provide any details about who is exploiting the vulnerabilities, nor to what end, but we know that commercial spyware and government-sponsored attackers like to exploit these types of mobile device zero-days for snooping purposes. This latest zero-day follows an emergency patch that Google issued last month for a high-severity Chrome bug that attackers have already found and exploited in the wild. That vulnerability, tracked as CVE-2025-13223, is a type confusion flaw in the V8 JavaScript engine, and it marked the seventh Chrome zero-day this year. All have since been patched. Seven bugs achieved a critical-severity rating in the Android December patch marathon. Google says the most serious of these is CVE-2025-48631, also in the framework component, which "could lead to remote denial of service with no additional execution privileges needed." There are also four critical escalation-of-privilege bugs in the kernel (CVE-2025-48623, CVE-2025-48624, CVE-2025-48637, and CVE-2025-48638), plus two critical vulnerabilities (CVE-2025-47319, CVE-2025-47372) affecting Qualcomm closed-source components. According to Qualcomm's security advisory, CVE-2025-47319 can allow "information disclosure while exposing internal TA-to-TA communication APIs to HLOS." CVE-2025-47372, a critical buffer overflow flaw, occurs when a corrupted ELF image with an oversized file is read into a buffer without authentication. Get patching on all of these 107 Android device security issues now - because Microsoft and friends will probably push even more updates during this month's Patch Tuesday event on December 9.
Daily Brief Summary
Google released patches for two high-severity Android zero-day vulnerabilities, CVE-2025-48633 and CVE-2025-48572, both affecting the framework component and potentially under targeted exploitation.
These vulnerabilities could lead to information disclosure and privilege escalation, posing significant risks to Android users if left unpatched.
In total, 107 security issues were addressed in Google's December Android security bulletin, including seven critical-severity vulnerabilities.
The most severe vulnerability, CVE-2025-48631, could enable remote denial of service without requiring additional execution privileges.
Four critical escalation-of-privilege bugs in the kernel and two critical vulnerabilities in Qualcomm components were also patched, addressing serious security concerns.
Users are advised to update their Android devices promptly to mitigate potential exploitation risks from these vulnerabilities.
The rapid patching of these vulnerabilities reflects ongoing efforts to protect against commercial spyware and government-sponsored attacks targeting mobile devices.