Google Releases December 2025 Android Security Update Addressing 107 Vulnerabilities, Including Two Actively Exploited Framework Flaws
On December 1, 2025, Google unveiled its monthly security update for the Android operating system, addressing a total of 107 vulnerabilities across various components. Notably, this update includes fixes for two high-severity flaws within the Framework component that have been actively exploited in the wild.
Details of the Actively Exploited Vulnerabilities:
1. CVE-2025-48633: An information disclosure vulnerability in the Framework component.
2. CVE-2025-48572: An elevation of privilege vulnerability in the Framework component.
While Google has not disclosed specific details regarding the nature of the attacks exploiting these vulnerabilities, the company acknowledged indications of limited, targeted exploitation. This suggests that malicious actors have been leveraging these flaws in specific, possibly high-value, targets.
Additional Critical Vulnerability Addressed:
The update also remedies a critical vulnerability in the Framework component:
– CVE-2025-48631: This flaw could lead to remote denial-of-service (DoS) attacks without requiring additional execution privileges.
Comprehensive Scope of the Update:
Beyond the Framework component, the December 2025 security bulletin encompasses vulnerabilities in several other areas, including:
– System: Core functionalities of the Android OS.
– Kernel: The central part of the operating system managing hardware and system processes.
– Third-Party Components: Vulnerabilities in components from Arm, Imagination Technologies, MediaTek, Qualcomm, and Unison.
Patch Levels and Deployment:
To facilitate timely and efficient deployment, Google has introduced two patch levels:
– 2025-12-01: Addresses a subset of vulnerabilities common across all Android devices.
– 2025-12-05: Encompasses fixes for all identified vulnerabilities, including those specific to certain devices or manufacturers.
This tiered approach allows device manufacturers to prioritize and expedite the deployment of critical fixes.
Recommendations for Users:
Android users are strongly advised to update their devices to the latest security patch level as soon as it becomes available. Regular updates are crucial in safeguarding devices against potential threats and ensuring optimal performance.
Context and Historical Perspective:
This update follows a series of proactive measures by Google to enhance Android security. In September 2025, the company addressed two actively exploited vulnerabilities:
– CVE-2025-38352: A privilege escalation flaw in the Linux Kernel component.
– CVE-2025-48543: A privilege escalation flaw in the Android Runtime component.
Both vulnerabilities had the potential to allow local privilege escalation without requiring additional execution privileges.
Furthermore, in May 2025, Google patched CVE-2025-27363, a high-severity flaw in the System component rooted in the FreeType open-source font rendering library. This vulnerability could lead to local code execution without needing additional execution privileges.
Industry-Wide Implications:
The consistent discovery and patching of vulnerabilities underscore the dynamic nature of cybersecurity threats. In 2024, Google reported 75 zero-day vulnerabilities exploited in the wild, with 44% targeting enterprise security products. This highlights the importance of continuous vigilance and prompt response to emerging threats.
Conclusion:
Google’s December 2025 security update reflects the company’s ongoing commitment to fortifying the Android ecosystem against evolving threats. By addressing a broad spectrum of vulnerabilities, including those actively exploited, Google aims to enhance user security and maintain trust in its platform.