Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      This week in AI updates: Mistral’s new Le Chat features, ChatGPT updates, and more (September 5, 2025)

      September 6, 2025

      Designing For TV: Principles, Patterns And Practical Guidance (Part 2)

      September 5, 2025

      Neo4j introduces new graph architecture that allows operational and analytics workloads to be run together

      September 5, 2025

      Beyond the benchmarks: Understanding the coding personalities of different LLMs

      September 5, 2025

      Hitachi Energy Pledges $1B to Strengthen US Grid, Build Largest Transformer Plant in Virginia

      September 5, 2025

      How to debug a web app with Playwright MCP and GitHub Copilot

      September 5, 2025

      Between Strategy and Story: Thierry Chopain’s Creative Path

      September 5, 2025

      What You Need to Know About CSS Color Interpolation

      September 5, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Why browsers throttle JavaScript timers (and what to do about it)

      September 6, 2025
      Recent

      Why browsers throttle JavaScript timers (and what to do about it)

      September 6, 2025

      How to create Google Gemini AI component in Total.js Flow

      September 6, 2025

      Drupal 11’s AI Features: What They Actually Mean for Your Team

      September 5, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Harnessing GitOps on Linux for Seamless, Git-First Infrastructure Management

      September 6, 2025
      Recent

      Harnessing GitOps on Linux for Seamless, Git-First Infrastructure Management

      September 6, 2025

      How DevOps Teams Are Redefining Reliability with NixOS and OSTree-Powered Linux

      September 5, 2025

      Distribution Release: Linux Mint 22.2

      September 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Google Patches 111 Android Vulnerabilities, Confirms Active Exploitation of Two Zero-Days

    Google Patches 111 Android Vulnerabilities, Confirms Active Exploitation of Two Zero-Days

    September 5, 2025

    CVE-2025-48543

    In its latest Android Security Bulletin, Google has confirmed the patching of 111 unique security vulnerabilities, including two zero-day vulnerabilities that were actively exploited in targeted attacks. The most concerning of these involve CVE-2025-48543, a flaw in Android Runtime, and CVE-2025-38352, a bug in the Linux kernel. 

    According to Google’s advisory, both CVE-2025-48543 and CVE-2025-38352 are elevation of privilege (EoP) vulnerabilities. These flaws enable attackers to gain elevated system privileges on Android devices without requiring any user interaction or additional execution rights. 

    “There are indications that the following may be under limited, targeted exploitation: CVE-2025-38352, CVE-2025-48543,” Google stated in the bulletin. 

    While Google has not released specific details on who might be exploiting these bugs or in what contexts, the acknowledgment of active exploitation stresses the severity of these issues. The company urges users to update their devices immediately to ensure they are protected. 

    CVE-2025-48543: Android Runtime Vulnerability 

    This vulnerability affects the Android Runtime (ART) component and was rated as “high” in severity. It affects Android versions 13 through 16. An attacker could leverage this flaw to perform local privilege escalation without requiring any user involvement.

    The issue has been addressed through Google Play system updates, ensuring that devices with Google Mobile Services (GMS) receive timely protection even outside regular OTA (over-the-air) updates.

    CVE-2025-38352: Linux Kernel Race Condition 

    The second critical vulnerability, CVE-2025-38352, resides in the Linux kernel, specifically in the handling of POSIX CPU timers. It stems from a race condition that could be exploited to escalate privileges locally. The vulnerability was first publicly patched in July 2025, and major Linux distributions have since deployed fixes. 

    Android devices that integrate this kernel version are also now receiving the fix via the September patch rollout. Google classifies this bug as “high” in severity due to its potential to compromise device integrity with little effort from attackers. 

    September 2025 Patch Details 

    The September 2025 Android Security Bulletin includes a comprehensive list of vulnerabilities, categorized by component. The bulletin spans flaws in Android Runtime, Framework, System, Kernel, and third-party components from MediaTek, Qualcomm, Arm, and Imagination Technologies. 

    One of the most severe vulnerabilities patched this month is CVE-2025-48539, a remote code execution (RCE) flaw in the System component that allows attackers to run code remotely without requiring user interaction.  

    Breakdown of Vulnerability Types 

    Of the 111 vulnerabilities addressed: 

    • A portion are elevation of privilege (EoP) issues, many of which require no user interaction. 
    • Several denial of service (DoS) vulnerabilities were also patched, including CVE-2025-48538 and CVE-2025-48542, both impacting Android versions 13 through 16. 
    • The Widevine DRM, WiFi, and Google Play system components also received critical patches. 

    Mitigations and User Protection 

    Google’s September 2025 Android update highlights the ongoing threat of privilege escalation attacks, with active exploits like CVE-2025-48543 and CVE-2025-38352 reinforcing the need for timely updates.  

    While protections like Google Play Protect help mitigate many risks, users are urged to install the latest patches and avoid unverified apps. Developers can expect AOSP patches within 48 hours, and all users should ensure their devices are updated to the 2025-09-05 patch level or later for full security. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleDjango Web Vulnerability Exposes Applications to High-Risk SQL Injection – CVE-2025-57833
    Next Article Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions

    Related Posts

    Development

    How to focus on building your skills when everything’s so distracting with Ania Kubów [Podcast #187]

    September 6, 2025
    Development

    Introducing freeCodeCamp Daily Python and JavaScript Challenges – Solve a New Programming Puzzle Every Day

    September 6, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Exclusive Talk: Joey Conway of NVIDIA on Llama Nemotron Ultra and Open Source Models

    Machine Learning

    CVE-2025-5277 – Amazon Web Services (AWS) MCP-Server Command Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-46547 – Sherpa Orchestrator Cross-Site Request Forgery (XSS, SQL Injection) Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Little Nightmares III Confirmed to Arrive this October 10 – Know More About the Creepy Carnevale Level Here

    Operating Systems

    Highlights

    CVE-2025-3893 – MegaBIP SQL Injection

    May 23, 2025

    CVE ID : CVE-2025-3893

    Published : May 23, 2025, 11:15 a.m. | 1 hour, 24 minutes ago

    Description : While editing pages managed by MegaBIP a user with high privileges is prompted to give a reasoning for performing this action. Input provided by the the user is not sanitized, leading to SQL Injection vulnerability. 
    Version 5.20 of MegaBIP fixes this issue.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-45765 – Apache Ruby-JWT Weak Encryption Vulnerability

    August 7, 2025

    Here’s How to Enable AI Actions in File Explorer in Windows 11

    May 21, 2025

    ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach

    May 30, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.