Android

Google has released the May 2025 security updates for Android with fixes for 45 security flaws, including an actively exploited zero-click FreeType 2 code execution vulnerability.

FreeType is a popular open-source font rendering library that displays and programmatically adds text to images.

The flaw, tracked as CVE-2025-27363, is a high-severity arbitrary code execution bug discovered by Facebook security researchers in March 2025.

Wiz

It impacts all FreeType versions up to 2.13, which was released on February 9, 2023, and addresses the vulnerability.

"There are indications that CVE-2025-27363 may be under limited, targeted exploitation," reads the bulletin.

Neither Facebook nor Google disclosed details about how the flaw is used in attacks. However, Facebook's disclosure in March explains that it can be exploited when FreeType parses a malicious TrueType GX or variable fonts file, leading to code execution.

"An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files," reads Facebook's disclosure.

"The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution."

The rest of the flaws fixed by Google this month concern problems in Framework, System, Google Play, and the Android Kernel, as well as security gaps in proprietary components from MediaTek, Qualcomm, Arm, and Imagination Technologies.

All the flaws in core Android components are rated high severity, with most being elevation of privilege problems.

The released fixes concern Android versions 13, 14, and 15, though not all vulnerabilities impact all three.

Android 12 reached the end of support on March 31, 2025, so it's no longer receiving security fixes. However, it (and older versions) may be impacted by some of the vulnerabilities listed in the latest bulletin.

Google regularly incorporates critical fixes for those devices via the Google Play system update channel, though specific fixes to actively exploited flaws aren't guaranteed for older devices.

Android users on versions older than 13 are recommended to consider third-party Android distributions that incorporate security fixes for unsupported devices or move to a newer model that is supported by its OEM.

To apply the latest Android update, go to Settings > Security & privacy > System & updates > Security update > click 'Check for update.' (the process may vary per OEM/model).

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.

Related Articles:

Google fixes two Android zero days exploited in attacks, 107 flaws

Google enables Pixel-to-iPhone file sharing via Quick Share, AirDrop

Critical RCE flaw impacts over 115,000 WatchGuard firewalls

Hackers exploit newly patched Fortinet auth bypass flaws

New critical WatchGuard Firebox firewall flaw exploited in attacks