8
0
19
7
Vulnerability Timeline
8 vulnerabilities discovered over time for Android
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-69279 | 7.5 | This vulnerability allows an attacker to remotely crash an Android device without needing special permissions. It occurs due to a failure to properly check input in the nr modem, which means that simply sending the right kind of data can disrupt the device's operation. | googleandroid | Theoretical | 30 days agoMar 9, 2026 |
| CVE-2025-69278 | 7.5 | This vulnerability allows an attacker to crash an Android device remotely, causing it to stop working properly. It requires no special permissions, meaning anyone can exploit it without needing to be logged in or have access to the device. | googleandroid | Theoretical | 30 days agoMar 9, 2026 |
| CVE-2025-61616 | 7.5 | This vulnerability allows an attacker to crash an Android device remotely, causing it to become unresponsive. It requires no special permissions, meaning anyone can exploit it simply by sending the right input to the device's modem. | googleandroid | Exploit Available | 30 days agoMar 9, 2026 |
| CVE-2025-61615 | 7.5 | This vulnerability allows an attacker to crash an Android device remotely, causing it to stop working properly. It can happen without needing any special permissions, simply by sending the device improper data. | googleandroid | Theoretical | 30 days agoMar 9, 2026 |
| CVE-2025-61614 | 7.5 | This vulnerability allows an attacker to remotely crash an Android device without needing special permissions, effectively causing a denial of service. It occurs due to the device not properly checking the input it receives, which can be exploited under certain conditions. | googleandroid | Theoretical | 30 days agoMar 9, 2026 |
| CVE-2025-61613 | 7.5 | This vulnerability allows an attacker to remotely crash an Android device without needing special permissions, causing a denial of service. It occurs due to the system not properly checking the input it receives, which can be exploited by sending malformed data to the modem. | googleandroid | Theoretical | 30 days agoMar 9, 2026 |
| CVE-2025-61612 | 7.5 | This vulnerability allows an attacker to remotely crash an Android device, causing it to stop working properly. It can be exploited without needing any special permissions, simply by sending malformed data to the device's modem. | googleandroid | Theoretical | 30 days agoMar 9, 2026 |
| CVE-2026-20416 | 7.2 | This vulnerability allows an attacker with system-level access on an Android device to gain higher privileges, potentially letting them take control of the device. The attacker does not need any user interaction to exploit this flaw, but they must already have system privileges to start with. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
About Google Android Security
This page provides comprehensive security vulnerability tracking for Google Android. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Android updated to the latest version
- • Subscribe to security advisories from Google
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately