Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers


Thank you for reading this post, don't forget to subscribe!

Might 06, 2025Ravie LakshmananVulnerability / Cellular Safety

Android System Flaw in May 2025 Security Update

Google has launched its month-to-month safety updates for Android with fixes for 46 safety flaws, together with one vulnerability that it mentioned has been exploited within the wild.

The vulnerability in query is CVE-2025-27363 (CVSS rating: 8.1), a high-severity flaw within the System element that would result in native code execution with out requiring any extra execution privileges.

“Essentially the most extreme of those points is a excessive safety vulnerability within the System element that would result in native code execution with no extra execution privileges wanted,” Google mentioned in a Monday advisory. “Consumer interplay just isn’t wanted for exploitation.”

It is price noting that CVE-2025-27363 is rooted within the FreeType open-source font rendering library. It was first disclosed by Fb in March 2025 as having been exploited within the wild.

Cybersecurity

The shortcoming has been described as an out-of-bounds write flaw that would end in code execution when parsing TrueType GX and variable font recordsdata. The difficulty has been remediated in FreeType variations larger than 2.13.0.

“There are indications that CVE-2025-27363 could also be underneath restricted, focused exploitation,” Google acknowledged in its safety bulletin. The precise specifics of the assaults are presently unknown.

Google’s Might replace additionally resolves eight different flaws within the Android System and 15 flaws within the Framework module that might be abused to facilitate privilege escalation, info disclosure, and denial-of-service.

“Exploitation for a lot of points on Android is made tougher by enhancements in newer variations of the Android platform,” the corporate mentioned. “We encourage all customers to replace to the most recent model of Android the place doable.”

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.