The Android Security Bulletin for June 2025, published on June 2, details a series of high-severity vulnerabilities affecting a wide range of Android devices.
Security patch levels of 2025-06-05 or later address all reported issues, with source code patches set for imminent release to the Android Open Source Project (AOSP) repository.
The most critical vulnerability this month is a high-severity escalation of privilege (EoP) flaw in the System component, which could allow an attacker to gain elevated access on a device with minimal user interaction and no additional execution privileges required.
Key Vulnerabilities by Component
The bulletin categorizes vulnerabilities by affected component, including Android Runtime, Framework, System, and various hardware subcomponents.
Each entry is identified by a unique CVE (Common Vulnerabilities and Exposures) code, with technical classifications such as DoS (Denial of Service), EoP (Elevation of Privilege), and ID (Information Disclosure).
Below is a summary table of notable vulnerabilities from the June 2025 bulletin:
Component | CVE | Type | Severity | Affected Versions |
---|---|---|---|---|
Android Runtime | CVE-2025-26456 | DoS | High | 14, 15 |
Framework | CVE-2025-26450 | EoP | High | 13, 14, 15 |
Framework | CVE-2025-26455 | EoP | High | 13, 14, 15 |
System | CVE-2025-26443 | EoP | High | 13, 14, 15 |
System | CVE-2025-26441 | ID | High | 13, 14, 15 |
Arm (Mali GPU) | CVE-2025-0073 | — | High | Mali |
Imagination Tech | CVE-2024-12576 | — | High | PowerVR-GPU |
Qualcomm Kernel | CVE-2025-21424 | — | High | Kernel |
Technical terms:
- EoP (Elevation of Privilege): A vulnerability allowing unauthorized privilege escalation.
- DoS (Denial of Service): A flaw that could make a device unusable.
- ID (Information Disclosure): A vulnerability that could leak sensitive data.
- CVE: An industry-standard identifier for publicly known cybersecurity vulnerabilities.
Patch Levels and Update Mechanisms
The bulletin introduces two patch levels: 2025-06-01 and 2025-06-05. Devices with the 2025-06-01 patch level must include all fixes for that date and earlier, while those with 2025-06-05 or newer must include all applicable patches from this and previous bulletins.
Device manufacturers are instructed to set the security patch string as follows:
text[ro.build.version.security_patch]:[2025-06-01]
[ro.build.version.security_patch]:[2025-06-05]
For devices running Android 10 or later, Google Play system updates may also reflect these patch levels, ensuring broader coverage even for devices not receiving full firmware updates.
Enhanced Protections and Recommendations
Security on Android is bolstered by platform and service mitigations, including Google Play Protect, which scans for potentially harmful applications and is enabled by default on most devices.
The Android security team continues to monitor for abuse and urges all users to update their devices promptly to the latest patch level.
The following table clarifies the technical codes used in the bulletin:
Abbreviation | Definition |
---|---|
RCE | Remote Code Execution |
EoP | Elevation of Privilege |
ID | Information Disclosure |
DoS | Denial of Service |
Device owners can verify their security patch level in system settings and are encouraged to apply updates as soon as they become available.
Android partners and OEMs are expected to bundle all relevant fixes in a single update to maximize user protection.
In summary, the June 2025 Android Security Bulletin addresses multiple high-severity vulnerabilities across core system and hardware components.
Timely updates and ongoing platform protections remain critical to safeguarding Android users worldwide.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!