Tuesday, June 10, 2025
HomeAndroidAndroid Security Update Addresses High-Severity Privilege Escalation Flaws

Android Security Update Addresses High-Severity Privilege Escalation Flaws

Published on

SIEM as a Service

Follow Us on Google News

The Android Security Bulletin for June 2025, published on June 2, details a series of high-severity vulnerabilities affecting a wide range of Android devices.

Security patch levels of 2025-06-05 or later address all reported issues, with source code patches set for imminent release to the Android Open Source Project (AOSP) repository.

The most critical vulnerability this month is a high-severity escalation of privilege (EoP) flaw in the System component, which could allow an attacker to gain elevated access on a device with minimal user interaction and no additional execution privileges required.

- Advertisement - Google News

Key Vulnerabilities by Component

The bulletin categorizes vulnerabilities by affected component, including Android Runtime, Framework, System, and various hardware subcomponents.

Each entry is identified by a unique CVE (Common Vulnerabilities and Exposures) code, with technical classifications such as DoS (Denial of Service), EoP (Elevation of Privilege), and ID (Information Disclosure).

Below is a summary table of notable vulnerabilities from the June 2025 bulletin:

ComponentCVETypeSeverityAffected Versions
Android RuntimeCVE-2025-26456DoSHigh14, 15
FrameworkCVE-2025-26450EoPHigh13, 14, 15
FrameworkCVE-2025-26455EoPHigh13, 14, 15
SystemCVE-2025-26443EoPHigh13, 14, 15
SystemCVE-2025-26441IDHigh13, 14, 15
Arm (Mali GPU)CVE-2025-0073—HighMali
Imagination TechCVE-2024-12576—HighPowerVR-GPU
Qualcomm KernelCVE-2025-21424—HighKernel

Technical terms:

  • EoP (Elevation of Privilege): A vulnerability allowing unauthorized privilege escalation.
  • DoS (Denial of Service): A flaw that could make a device unusable.
  • ID (Information Disclosure): A vulnerability that could leak sensitive data.
  • CVE: An industry-standard identifier for publicly known cybersecurity vulnerabilities.

Patch Levels and Update Mechanisms

The bulletin introduces two patch levels: 2025-06-01 and 2025-06-05. Devices with the 2025-06-01 patch level must include all fixes for that date and earlier, while those with 2025-06-05 or newer must include all applicable patches from this and previous bulletins.

Device manufacturers are instructed to set the security patch string as follows:

text[ro.build.version.security_patch]:[2025-06-01]
[ro.build.version.security_patch]:[2025-06-05]

For devices running Android 10 or later, Google Play system updates may also reflect these patch levels, ensuring broader coverage even for devices not receiving full firmware updates.

Enhanced Protections and Recommendations

Security on Android is bolstered by platform and service mitigations, including Google Play Protect, which scans for potentially harmful applications and is enabled by default on most devices.

The Android security team continues to monitor for abuse and urges all users to update their devices promptly to the latest patch level.

The following table clarifies the technical codes used in the bulletin:

AbbreviationDefinition
RCERemote Code Execution
EoPElevation of Privilege
IDInformation Disclosure
DoSDenial of Service

Device owners can verify their security patch level in system settings and are encouraged to apply updates as soon as they become available.

Android partners and OEMs are expected to bundle all relevant fixes in a single update to maximize user protection.

In summary, the June 2025 Android Security Bulletin addresses multiple high-severity vulnerabilities across core system and hardware components.

Timely updates and ongoing platform protections remain critical to safeguarding Android users worldwide.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Anupriya
Anupriya
Any Priya is a cybersecurity reporter at GBHackers On Security, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Latest articles

Ivanti Workspace Control Vulnerability Lets Attackers Remotely Exploit To Steal the Credential

Ivanti has released a critical security update for its Workspace Control software, patching three...

Hackers Persist in Using ConnectWise ScreenConnect Tool to Distribute Malware

Hackers continue to exploit the ConnectWise ScreenConnect remote management and monitoring (RMM) tool to...

Severe SAP NetWeaver Vulnerability Allows Attackers to Bypass Authorization Checks

SAP has released nineteen security patches in its June Patch Day, addressing critical vulnerabilities...

New SharePoint Phishing Campaigns Employing Deceptive Lick Techniques

Security analysts at CyberProof’s Security Operations Center (SOC) have identified a sharp rise in...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Ivanti Workspace Control Vulnerability Lets Attackers Remotely Exploit To Steal the Credential

Ivanti has released a critical security update for its Workspace Control software, patching three...

Hackers Persist in Using ConnectWise ScreenConnect Tool to Distribute Malware

Hackers continue to exploit the ConnectWise ScreenConnect remote management and monitoring (RMM) tool to...

Severe SAP NetWeaver Vulnerability Allows Attackers to Bypass Authorization Checks

SAP has released nineteen security patches in its June Patch Day, addressing critical vulnerabilities...