Android December 2025 Security Bulletin: DFIR impact and fleet actions

Google’s December 2025 Android bulletin fixes a critical Framework remote DoS and other vulnerabilities. Here’s how to triage devices, ve...

Google published the Android Security Bulletin for December 2025 with patch levels 2025-12-01 and 2025-12-05. The most severe issue is a critical Framework vulnerability that enables remote denial of service; Google also notes two CVEs under limited, targeted exploitation. Source code patches land in AOSP within 48 hours of publication, then vendors integrate and ship updates. Verify exposure by checking each device’s reported patch level. (Android bulletin, Dec 1, 2025; Google Support: check patch level)

Intrusion Flow

  • Initial effect: A crafted trigger can crash or stall Framework components, producing device unresponsiveness, ANR dialogs, or forced restarts indicative of a remote DoS. The bulletin calls out a critical Framework DoS (CVE-2025-48631) and flags CVE-2025-48633 and CVE-2025-48572 as possibly exploited in limited, targeted attacks. (Android bulletin)
  • Secondary effects: Subsequent instability may surface as native crashes (tombstones) or ANR traces. Android stores ANR traces under /data/anr and records native crash “tombstones,” both captured in bugreports and written to disk. (ANR traces; Diagnose native crashes; Read bug reports)
  • Patch scope: 2025-12-01 covers Framework/System and other platform fixes; 2025-12-05 adds kernel items including critical EoP in pKVM/IOMMU (for full coverage, target 12-05 fleet-wide). (Android bulletin)

Key Artifacts to Pull

  • Fleet exposure evidence
  • Crash and hang evidence
    • Bugreport (captures dumpsys, dumpstate, logcat, ANR/tombstones snapshots):
      adb bugreport ./bugreport.zip
      
      Then parse the zip’s top-level bugreport-*.txt for ANRs and system_server issues. (Capture & read bug reports; Read bug reports)
    • ANR traces (root or userdebug builds):
      adb root
      adb shell ls /data/anr
      adb pull /data/anr/<anr_file>
      
      Newer Android uses multiple /data/anr/anr_* files; older versions keep /data/anr/traces.txt. (ANR traces)
    • Native crash tombstones:
      adb root
      adb shell ls /data/tombstones
      adb pull /data/tombstones/tombstone_*
      
      Tombstones are generated by debuggerd and summarized in bugreports. (Diagnose native crashes)
    • DropBox (system crash log queue) for tags like SYSTEM_TOMBSTONE and system_server_native_crash:
      adb shell dumpsys dropbox | grep -i "tombstone\|system_server_native_crash"
      
      DropBoxManager stores crash text under /data/system/dropbox; BootReceiver copies tombstone content into DropBox and emits the special system_server_native_crash tag. (DropBoxManager API; BootReceiver handling of tombstones and tag; SEPolicy type for /data/system/dropbox)

Detection Notes

  • Symptom-driven: Look for spikes in ANR events and repeated system_server crashes or restarts around suspected attack times. Bugreports contain VM TRACES AT LAST ANR, logcat sections, and DropBox entries you can correlate by timestamp and PID. (Read bug reports; Keep apps responsive / ANR triggers)
  • EMM/MDM compliance: Enforce a minimum Android security patch level policy so noncompliant devices can’t access corporate resources until updated. In Microsoft Intune and Graph, use minAndroidSecurityPatchLevel in Android compliance policies. (Graph v1.0 androidCompliancePolicy; Graph beta androidDeviceOwnerCompliancePolicy)
  • Store protections: Google Play Protect continuously scans apps and helps flag PHAs, reducing opportunistic abuse. Verify Play Protect is enabled on GMS devices if your policy allows user apps. (Google Play Protect)

Response Guidance

Takeaways

Sources / References