{"id":403581,"date":"2025-09-06T21:11:13","date_gmt":"2025-09-06T21:11:13","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/403581\/"},"modified":"2025-09-06T21:11:13","modified_gmt":"2025-09-06T21:11:13","slug":"google-confirms-android-attacks-no-fix-for-1-billion-phones","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/403581\/","title":{"rendered":"Google Confirms Android Attacks\u2014No Fix For 1 Billion Phones"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/uk\/wp-content\/uploads\/2025\/09\/1757193073_815_960x0.jpg\" alt=\"Google Android characters\" data-height=\"3915\" data-width=\"6155\" style=\"position:absolute;top:0\"\/><\/p>\n<p>Do you need a new phone?<\/p>\n<p>getty<\/p>\n<p>Republished on September 6 with a new update deadline for government staff following Google\u2019s confirmation that attacks on Android phones are now underway.<\/p>\n<p>Google has issued a <a class=\"color-link\" href=\"https:\/\/source.android.com\/docs\/security\/bulletin\/2025-09-01\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/source.android.com\/docs\/security\/bulletin\/2025-09-01\" aria-label=\"critical warning\">critical warning<\/a> for all Android users, confirming that two separate vulnerabilities have been exploited in the wild. Such is the seriousness of its security update this month, that Google will <a class=\"color-link\" href=\"https:\/\/www.androidcentral.com\/phones\/google-pixel\/google-september-security-update-pixels-slides-fixes-for-the-whole-series\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.androidcentral.com\/phones\/google-pixel\/google-september-security-update-pixels-slides-fixes-for-the-whole-series\" aria-label=\"quickly fix all eligible Pixel devices\">quickly fix all eligible Pixel devices<\/a>.<\/p>\n<p>The two high-severity vulnerabilities that have been exploited \u2014 CVE-2025-38352 and CVE-2025-48543 \u2014 affect the Android Kernel and Android Runtime respectively. As ever, Google has not issued any material detail at this early stage.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-2\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/09\/04\/250-million-personal-identities-published-in-massive-data-leak\/\" target=\"_blank\" aria-label=\"250 Million Personal Identities Exposed In \u2018Massive Data Leak\u2019\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/09\/04\/250-million-personal-identities-published-in-massive-data-leak\/\" rel=\"noopener\">Forbes250 Million Personal Identities Exposed In \u2018Massive Data Leak\u2019By Zak Doffman<\/a><\/p>\n<p>There are also four other critical fixes \u2014 CVE-2025-48539, CVE-2025-21450, CVE-2025-21483 and CVE-2025-27034. The first is an Android System issue, whilst the other three relate to <a class=\"color-link\" href=\"https:\/\/docs.qualcomm.com\/product\/publicresources\/securitybulletin\/september-2025-bulletin.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/docs.qualcomm.com\/product\/publicresources\/securitybulletin\/september-2025-bulletin.html\" aria-label=\"Qualcomm\">Qualcomm<\/a> chipsets and the release of manufacturer fixes.<\/p>\n<p>Google says CVE-2025-48543 and CVE-2025-38352 are deeply concerning, and both \u201ccould lead to local escalation of privilege with no additional execution privileges needed.&#8221; More alarmingly, &#8220;user interaction is not needed for exploitation.\u201d<\/p>\n<p>Whilst Pixels will be updated immediately, other OEMs will receive code patches \u201cin the next 48 hours\u201d and will need to update their own monthly bulletins and firmware releases. You can expect the usual deployment schedule over the coming weeks.<\/p>\n<p>A timely reminder that only devices still eligible for monthly security updates will receive these fixes. Upwards of <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/07\/08\/googles-android-upgrade-1-billion-users-need-a-new-phone\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/07\/08\/googles-android-upgrade-1-billion-users-need-a-new-phone\/\" target=\"_self\" aria-label=\"a billion Android phones\" rel=\"noopener\">a billion Android phones<\/a> are no longer on any form of support contract, and many are running versions of Android that can\u2019t be updated.<\/p>\n<p>Android update eligibility<\/p>\n<p>EndOfLife<\/p>\n<p>This is exactly why owners of these older devices are urged to upgrade their phones if they can\u2019t update their software. Until you do, your data and your device are at risk.<\/p>\n<p>As <a class=\"color-link\" href=\"https:\/\/lp.zimperium.com\/hubfs\/Reports\/2025%20Global%20Mobile%20Threat%20Report.pdf?hsLang=en\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/lp.zimperium.com\/hubfs\/Reports\/2025%20Global%20Mobile%20Threat%20Report.pdf?hsLang=en\" aria-label=\"Zimperium\">Zimperium<\/a> warns, \u201ca significant percentage (25.3%) of devices are not upgradeable due to the device\u2019s age.\u201d And delayed updates makes that problem worse. \u201cAt any given point in the year, over 50% of mobile devices are running outdated OS versions, and a significant number are compromised or infected.&#8221;<\/p>\n<p>America\u2019s cyber defense agency added both Android security threats to its Known Exploited Vulnerability (<a class=\"color-link\" href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" aria-label=\"KEV\">KEV<\/a>) catalog on September 4. Federal staff have until September 25 to update or stop using their Android devices. Clearly, in the unlikely event any devices that can\u2019t be updated are still in use by federal agency staff, those will need to be upgraded to new hardware by the deadline date.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-3\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/09\/03\/millions-of-iphone-and-android-users-get-surprise-refund-offers\/\" target=\"_blank\" aria-label=\"Millions Of iPhone And Android Users Get Surprise Refunds\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/09\/03\/millions-of-iphone-and-android-users-get-surprise-refund-offers\/\" rel=\"noopener\">ForbesMillions Of iPhone And Android Users Get Surprise RefundsBy Zak Doffman<\/a><\/p>\n<p>CVE-2025-38352 is a Linux kernel &#8220;time-of-check time-of-use race condition vulnerability that has a high impact on confidentiality, integrity, and availability,\u201d CISA says. While CVE-2025-48543 is an \u201cAndroid Runtime Use-After-Free Vulnerability,\u201d which \u201cpotentially allows a chrome sandbox escape leading to local privilege escalation.\u201d<\/p>\n<p>While CISA\u2019s update mandate is for federal staff only, its guidance is much broader. The agency and its KEV catalog operate \u201cfor the benefit of the cybersecurity community and network defenders&#8221; across both the public and private sector.<\/p>\n","protected":false},"excerpt":{"rendered":"Do you need a new phone? getty Republished on September 6 with a new update deadline for government&hellip;\n","protected":false},"author":2,"featured_media":403582,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3159],"tags":[35057,42698,26516,633,547,41852,4692,18670,4693,53,16,15],"class_list":{"0":"post-403581","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-mobile","8":"tag-android-attack","9":"tag-android-update","10":"tag-android-warning","11":"tag-google-warning","12":"tag-mobile","13":"tag-pixel-update","14":"tag-pixel-warning","15":"tag-samsung-update","16":"tag-samsung-warning","17":"tag-technology","18":"tag-uk","19":"tag-united-kingdom"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/115159412605857613","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/403581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=403581"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/403581\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/403582"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=403581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=403581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=403581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}