December 2, 2025, 3:30 pm | Read time: 2 minutes
Google has released the Android Security Bulletin for December, providing an overview of vulnerabilities found in the operating system. This month, significantly more–some critical–security flaws appear than in previous bulletins. But don’t worry: A corresponding patch is already available and addresses the most serious issues for devices with Android 13 and newer.
Critical Security Flaws in Android
Google issues monthly security patches to Android devices, which are released independently of major version updates. The patch level indicates the security status of a specific device. So far, a bulletin is published each month, listing all known vulnerabilities. The patch level for the respective month addresses these security gaps.
With the patch from 12/01/2025, Google addresses a range of security issues discovered in various Android components. Particularly severe is a flaw in the Android framework (identifier CVE-2025-48631), which allows attackers to remotely initiate a denial-of-service attack (DDoS)–without additional permissions. All currently supported Android versions (13, 14, 15, 16) are affected.
On the system level, the patch also fixes a serious security flaw that allows attackers to expand their permissions to start background activities–without user consent.
Google Closes Android Security Vulnerability Exploited by Hackers
Google Closes Three Critical Chrome Security Vulnerabilities
Two Patches in One Month
Compared to the bulletins from October and November, which contained only a few security flaws, the December edition is significantly more extensive. This is likely due to Google’s shift to a quarterly release cycle, where more discoveries are reported collectively.
Also of interest: Why the Majority of All Android Smartphones Are Insecure
The sheer number of security flaws has prompted Google to issue a second patch for December. With the level from 12/05/2025, further critical issues at the kernel level are addressed, which also led to an expansion of permissions. Additionally, the patch level includes fixes for several chip vulnerabilities. Models from ARM, Qualcomm, Mediatek, and Unisoc are affected.
TECHBOOK Recommends the Update
To be on the safe side, both security patch levels should be installed immediately as soon as they are available on the respective device. This is the only way to keep smartphones and tablets protected from known security risks.