Patchday: Attacks on devices with Android 13, 14, 15, and 16 observed

Important security updates have been released for various Android versions. Attacks are already occurring.

listen Print view
Green Android figure in front of a lock symbol

Google Android's Bugdroid in front of a lock symbol.

(Image: Primakov/Shutterstock.com)

2 min. read

Currently, attackers are targeting devices with Android 13, 14, 15, and 16, exploiting two security vulnerabilities. Security patches are available for selected smartphones and tablets.

Since July of this year, Google has only been patching particularly dangerous vulnerabilities monthly. The remaining updates have since been released quarterly. Consequently, compared to November, there are a lot of security patches this month.

As Google reports in a post, attackers are currently exploiting two vulnerabilities (CVE-2025-48572 "high", CVE-2025-48633 "high"). The extent to which this is happening is currently unknown. Google speaks of "limited and targeted" attacks.

Videos by heise

According to the brief description, the first vulnerability allows attackers to gain higher user privileges. The second vulnerability can lead to information leaks. How the attacks are carried out is currently unclear.

Furthermore, the developers warn of a "critical" vulnerability (CVE-2025-48631) in the framework component of Android 13, 14, 15, and 16. Other vulnerabilities allow for DoS attacks, among other things.

In addition, the developers have closed vulnerabilities in the kernel and system. Components from Arm and Qualcomm, among others, have also received security updates. This affects, among other things, the Mali graphics component and the bootloader. Owners of devices still under support should ensure in their settings that one of the patch levels 2025-12-01 or 2025-12-05 is installed.

In addition to Google, Samsung, among others, regularly releases patches for specific devices (see box).

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.