Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Google Rolls Out May 2025 Android Security Bulletin, Fixes 46 Vulnerabilities Including CVE-2025-27363

    Google Rolls Out May 2025 Android Security Bulletin, Fixes 46 Vulnerabilities Including CVE-2025-27363

    May 7, 2025

    Android Security Bulletin

    Google has published its Android Security Bulletin for May 2025, delivering critical updates to the Android ecosystem. This monthly update resolves 46 vulnerabilities, one of which—CVE-2025-27363—has already been exploited in the wild. 

    CVE-2025-27363, a high-severity vulnerability with a CVSS score of 8.1, lies at the core of Google’s May 2025 Android Security Bulletin. Located in the Android System component, this flaw enables local code execution without requiring elevated privileges or user interaction, posing a serious risk to device integrity, particularly if platform and service mitigations are bypassed.  

    The vulnerability, which stems from the widely used FreeType open-source font rendering library, was first identified by Facebook researchers in March 2025 and has since been observed in limited, targeted exploitation.  

    Google described it as the most critical issue addressed in this update, stating, “The most severe of these issues is a high security vulnerability in the System component that could lead to local code execution with no additional execution privileges needed,” in its advisory released on May 5, 2025. 

    Key Details from the May 2025 Android Security Bulletin 

    The May bulletin breaks down the vulnerabilities into two patch levels: 

    • 2025-05-01 Security Patch Level 
    • 2025-05-05 Security Patch Level 

    Devices that receive the 2025-05-05 update will also be protected from all previously disclosed issues. 

    Highlights from the bulletin include 

    • 46 vulnerabilities addressed across core components like System, Framework, Kernel, and third-party hardware drivers. 
    • Android partners were informed at least a month in advance of the bulletin’s publication. 
    • Source code patches will be released into the Android Open Source Project (AOSP) within 48 hours of publication. 

    Other High-Severity Vulnerabilities Patched 

    Apart from CVE-2025-27363, several other critical issues have been resolved. These include: 

    Framework Vulnerabilities (Examples) 

    • CVE-2025-0087 — Elevation of Privilege (EoP) affecting Android versions 13, 14, and 15.
    • CVE-2025-26426 — EoP issue impacting Android 13, 14, and 15.

    System Component Vulnerabilities

    • CVE-2025-26420, CVE-2025-26421 — High-severity EoP bugs patched in multiple versions.
    • CVE-2025-26430 — Local EoP affecting Android 15.

    Google Play System Updates 

    Fixes for issues in: 

    • Documents UI 
    • Permission Controller 
    • WiFi subsystem 

    Third-Party Component Vulnerabilities 

    The bulletin also lists vulnerabilities tied to hardware vendors and chipset manufacturers. These include: 

    Arm (Mali GPU Drivers) 

    • CVE-2025-0072 
    • CVE-2025-0427 

    Imagination Technologies (PowerVR GPU) 

    • Multiple CVEs including CVE-2024-49739 and CVE-2024-47891 

    MediaTek 

    • CVE-2025-20666 — High-severity issue in MediaTek modem components 

    Qualcomm 

    Multiple issues including: 

    • CVE-2025-21467 and CVE-2025-21468 — High-risk flaws affecting camera and location services 
    • Vulnerabilities in closed-source Qualcomm components 

    Google Play Protect and Platform-Level Defenses 

    Google emphasizes the importance of Google Play Protect, which is: 

    • Enabled by default on devices with Google Mobile Services 
    • Designed to detect and warn users about Potentially Harmful Applications (PHAs) 
    • A vital layer of defense, especially for users installing apps from outside the Play Store 

    In addition, Google notes that newer Android versions include enhanced mitigations that make exploitation harder. 

    How to Check Your Security Patch Level 

    Users can check and update their Android version to ensure they have the latest protection. Devices with the following patch strings are considered secure: 

    • [ro.build.version.security_patch]:[2025-05-01] 
    • [ro.build.version.security_patch]:[2025-05-05] 

    Google encourages device manufacturers to bundle all fixes in a single OTA update for streamlined user security. 

    Conclusion  

    CVE-2025-27363 remains the only vulnerability in the May 2025 Android Security Bulletin confirmed to be actively exploited, highlighting the urgency for users to apply updates without delay, particularly those using Android 10 or later. Google has announced that corresponding patches will be made available in the Android Open Source Project (AOSP) within 48 hours. 

    Users are strongly encouraged to check their device’s security patch level and install the latest updates as soon as they become available. Full technical details, patch information, and related resources can be found in the official Android Security Bulletin—May 2025 on the Android developer portal. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleTeleMessage, the Signal clone used by US government officials, suffers hack
    Next Article A Breach, an Apology, and a Pledge to Change: SK Chairman Breaks Silence on Telecom Cyberattack

    Related Posts

    Development

    GPT-5 is Coming: Revolutionizing Software Testing

    July 22, 2025
    Development

    Win the Accessibility Game: Combining AI with Human Judgment

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    SAP NetWeaver Flaw Scores 10.0 Severity as Hackers Deploy Web Shells

    Security

    CVE-2025-5826 – Autel MaxiCharger AC Wallbox Commercial BLE Command Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Ferrari Just Launched an AI App That Lets Fans Experience F1 Like Never Before

    Artificial Intelligence

    CVE-2025-48080 – Uncanny Owl Uncanny Toolkit for LearnDash Stored Cross-site Scripting

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Development

    AI, Teens, and Trust: Roblox’s New Safety Tools Raise Old Questions

    July 18, 2025

    Roblox has announced a new suite of safety and privacy updates aimed at teenagers, including…

    CVE-2025-5732 – Traffic Offense Reporting System Cross-Site Request Forgery Vulnerability

    June 6, 2025

    CVE-2025-53633 – Chall-Manager Zip Bomb Vulnerability

    July 10, 2025

    CVE-2025-49866 – Nikel Beautiful Cookie Consent Banner Cross-site Scripting

    July 4, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.