Google releases November 2025 Android patch, fixes critical zero-click flaw
Take action: This advisory is very important since there is a critical flaw that covers all Android versions, but most users can't rush the patch because their vendors may not have released an updated version of Android for their devices. Be aware that you shouldn't delay the update to your Android when the notification arrives on your phone.
Learn More
Google has released the November 2025 Android security update patching a critical remote code execution vulnerability in Android's core System component that requires no user interaction for exploitation.
Vulnerabilities summary
- CVE-2025-48593 (CVSS score N/A, Google severity Critical), Remote Code Execution in System Component in validation of user input issue that allows remote attackers to execute arbitrary code. The vulnerability affects Android versions 13, 14, 15, and 16.
- CVE-2025-48581 (CVSS score N/A, Google severity High Severity), Elevation of Privilege in System Component in the VerifyNoOverlapInSessions function of apexd.cpp. It could allow attackers to block security updates through mainline installations. This vulnerability exclusively affects Android 16 devices.
Google released patches for both vulnerabilities in the November 2025 security update with security patch level 2025-11-01 or later. Devices updated to this patch level are protected against all vulnerabilities disclosed in this bulletin.
Android device owners should check their security patch level and install available updates. Google has released source code patches to the Android Open Source Project (AOSP) repository, and device manufacturers including Samsung, Google Pixel, OnePlus, Motorola, and others are integrating these fixes into their monthly over-the-air updates for distribution to end users.