Visualização de leitura

Critical Android Zero-Click Vulnerability Grants Remote Shell Access

Google has published the May 2026 Android Security Bulletin, alerting the ecosystem to a highly severe remote code execution (RCE) flaw.

Tracked as CVE-2026-0073, this critical vulnerability resides deep within the core Android System component.

It allows an attacker to gain remote shell access without requiring a single tap, download, or click from the device owner.

Threat actors can launch this zero-click attack proximally, meaning they only need to be on the same local network or in physical proximity to exploit a vulnerable mobile device.

Android Zero-Click Vulnerability

The root of CVE-2026-0073 lies within the adbd subcomponent, which stands for the Android Debug Bridge daemon.

Developers traditionally utilize this system service to communicate with a device, run terminal commands, and modify system behavior.

Because the flaw grants remote code execution as a “shell” user, attackers can bypass normal application sandboxes.

They do not need any special execution privileges or user interaction to deploy their malicious payloads successfully.

Imagine the adbd service as a restricted maintenance door on a secure corporate building.

This vulnerability acts like a master key that works over a wireless connection, allowing an intruder to quietly unlock the door and issue commands to the building’s internal systems without the security guard ever noticing.

This frictionless level of access makes the vulnerability highly dangerous and incredibly attractive to advanced threat actors.

Because the adbd service is a Project Mainline component distributed via Google Play system updates, the flaw affects multiple recent generations of the operating system.

Android 14, Android 15, Android 16, and Android 16-QPR2 devices are currently at risk.

Google has resolved this critical issue in the May 1, 2026, security patch level, as detailed in the Android Security Bulletin May 2026.

All Android hardware partners were notified of this vulnerability at least a month in advance to help them prepare over-the-air firmware updates.

Corresponding source code patches are also being pushed to the Android Open Source Project (AOSP) repository to ensure ongoing platform stability for the wider ecosystem.

Device owners must prioritize installing the latest security updates immediately to block potential exploitation.

To confirm that a device is protected, navigate to system settings and verify that the security patch level is May 1, 2026, or later.

Users should also manually check for pending Google Play system updates, as some devices running Android 10 or later may receive targeted component patches via this alternative channel.

Free Webinar to align your endpoint security to meet new requirements – Register Now

The post Critical Android Zero-Click Vulnerability Grants Remote Shell Access appeared first on Cyber Security News.

CVE-2025-48593: Critical Zero-Click Vulnerability in Android Enables Remote Code Execution

CVE-2025-48593 Vulnerability

As the effects of CVE-2024-1086 continue to unfold, a new vulnerability has emerged, posing a menace to cyber defenders. Google has flagged a critical zero-click flaw in the Android System component responsible for managing essential device functions. CVE-2025-48593  allows attackers to execute malicious code remotely without any user interaction, potentially giving them full control over affected devices. If exploited, it could lead to data theft, ransomware deployment, or even the use of compromised smartphones as nodes in larger botnet attacks, making it one of the most urgent security risks for mobile users today.

Mobile devices have become indispensable in both personal and professional life. According to Verizon’s 2024 report, 80% of companies consider mobile devices critical to their operations, which makes them especially attractive targets for enterprise-grade cyber attackers in 2025. Many apps still contain security weaknesses, and threats such as zero-click exploits and advanced malware are on the rise, highlighting the urgent need for proactive security measures.

Sign up for the SOC Prime Platform to access the global active threats feed, which offers real-time cyber threat intelligence and curated detection algorithms to address emerging threats. All the rules are compatible with multiple SIEM, EDR, and Data Lake formats and mapped to the MITRE ATT&CK® framework. Additionally, each rule is enriched with CTI links, attack timelines, audit configurations, triage recommendations, and more relevant context. Press Explore Detections to see the entire detection stack for proactive defense against critical vulnerabilities filtered by the “CVE” tag.

Explore Detections

Security engineers can also leverage Uncoder AI, an IDE and co-pilot for detection engineering. With Uncoder, defenders can instantly convert IOCs into custom hunting queries, craft detection code from raw threat reports, generate Attack Flow diagrams, enable ATT&CK tags prediction, leverage AI-driven query optimization, and translate detection content across multiple platforms.

CVE-2025-48593 Analysis

On November 3, 2025, Google released its November Android Security Bulletin, highlighting several major vulnerabilities in the Android System component. Among them, CVE-2025-48593 stands out as critical. This flaw allows attackers to execute malicious code remotely without requiring any user interaction or additional privileges, making it extremely dangerous for mobile users. 

According to Google, the vulnerability stems from insufficient validation of user input and affects Android versions 13 through 16. The flaw’s critical rating underscores its ease of exploitation and the potential for adversaries to gain unauthorized access to sensitive data, personal communications, and device resources.

Alongside this critical RCE vulnerability, Google also disclosed CVE-2025-48581, a high-severity elevation-of-privilege flaw that impacts Android 16 exclusively, allowing attackers to escalate privileges on affected devices.

These disclosures are part of Google’s coordinated vulnerability disclosure process, which notifies Android partners and device manufacturers at least one month before the public bulletin release. This timeline ensures manufacturers have sufficient time to develop, test, and distribute patches before vulnerabilities become widely known. Devices with a security patch level of 2025-11-01 or later include fixes for all vulnerabilities addressed in this bulletin. Source code patches are set to appear in the Android Open Source Project (AOSP) within 48 hours of the bulletin’s publication to ensure swift patch rollout.

As potential CVE-2025-48593 mitigation measures, users should check their device’s current security patch level through settings and install any available updates immediately. The fusion of zero-click exploitability and system-level control underscores the urgency of applying patches to safeguard sensitive data and preserve device security. 

The increasing volumes of RCE vulnerabilities uncovered in popular software products require ultra-resilience from defenders. By leveraging SOC Prime’s AI-Native Detection Intelligence Platform, organizations can anticipate, detect, validate, and respond to cyber threats faster and more effectively, while maximizing team productivity.



The post CVE-2025-48593: Critical Zero-Click Vulnerability in Android Enables Remote Code Execution appeared first on SOC Prime.

❌