As the year comes to an end, Google is ramping up its efforts to secure Android. With the massive rectification of 107 vulnerabilities, including two already exploited flaws, the Mountain View firm is demonstrating its commitment to user protection. This extensive update program will span several weeks, involving close collaboration with manufacturers for effective distribution of the patches.
The 3 key points not to miss
- Google has fixed **107 vulnerabilities** on Android, including two already exploited flaws.
- The CVE-2025-48633 and CVE-2025-48572 flaws affect **Android 13 to 16** versions.
- A third major vulnerability could lead to a **remote denial of service**.
A major security update for Android
Google has released a particularly important Android security bulletin, announcing the correction of 107 vulnerabilities. Among them, two flaws have already been exploited in targeted attacks. This deployment will take place in two phases, requiring collaboration from manufacturers to integrate these patches into device systems.
The two priority vulnerabilities, CVE-2025-48633 and CVE-2025-48572, are already exploited and are likely related to surveillance operations. The first allows for the disclosure of sensitive information, while the second permits privilege escalation within the system.
Critical flaws impacting Android 13 to 16
The critical flaws addressed by Google affect several versions of Android, from 13 to 16. CVE-2025-48633 exposes internal data usually protected, and CVE-2025-48572 allows a local process to acquire extended privileges, potentially compromising the device’s security.
In addition to these two flaws, a third vulnerability, listed under the code CVE-2025-48631, could cause a remote denial of service. Although it does not offer full control of the smartphone, it can nevertheless significantly disrupt its operation.
A diversity of vulnerabilities and a two-phase update process
The security bulletin includes a hundred other vulnerabilities, mainly classified as high, affecting various aspects of the Android system. The patches target the framework, system components, the kernel, and hardware modules. They particularly concern protected virtualization, memory management, as well as components from manufacturers such as Qualcomm, MediaTek, and Unisoc.
The updates will be distributed in two waves. The first, started on December 1st, concerns the framework and system component flaws. The second, scheduled for December 5th, will provide deeper corrections to kernels and hardware modules.
Advice for Android users
To ensure the security of your devices, it is recommended to closely follow the updates offered by Google. Regularly check your phone’s security patch level and enable Google Play Protect. Be cautious with installing applications from unverified sources.
For devices deemed obsolete, it is possible to opt for an alternative ROM like LineageOS or /e/OS, provided you are comfortable with this type of setup, or consider purchasing a newer smartphone model.
History of Android security
Android, the mobile operating system developed by Google, has always been at the center of security concerns due to its wide deployment and open-source nature. Since its launch in 2008, Google has regularly released security updates to counter emerging threats.
Every month, Google issues security bulletins to fix potential flaws. This proactive approach aims to protect users from attacks and strengthen confidence in the Android ecosystem. Historically, Google has worked closely with manufacturers to ensure these patches are integrated effectively and quickly.