Samsung has begun rolling out its November 2025 security maintenance release for its lineup of Galaxy devices. The update is a significant one, addressing a total of 45 security vulnerabilities. This includes critical and high-severity flaws patched by Google in the core Android operating system, most notably the zero-click RCE CVE-2025-48593. The package also contains 9 patches for Samsung's own One UI software and 11 fixes for vulnerabilities in its Exynos processors. Given the severity of the patched vulnerabilities, it is crucial for all Galaxy users to install this update as soon as it becomes available to protect their devices from potential exploitation.
The November 2025 update is a comprehensive package that combines fixes from Google's Android Security Bulletin with Samsung's own patches.
The update incorporates all patches from Google's November 2025 bulletin, which includes:
CVE-2025-48593 in the System component, which is the most severe issue addressed this month.Samsung has patched 9 vulnerabilities specific to its software, including:
CVE-2025-21071 (SVE-2024-1836): A high-severity out-of-bounds write vulnerability in the fingerprint trustlet, affecting Android versions 13 through 16.CVE-2025-21074 (SVE-2025-1898): An out-of-bounds read in the libimagecodec.quram.so library.The update also includes 11 security fixes for vulnerabilities discovered in Samsung's proprietary Exynos processors, further hardening the hardware foundation of many Galaxy devices.
This security maintenance release is applicable to a wide range of Samsung Galaxy devices, including smartphones and tablets, that are currently supported by the company's update policy. The specific models and rollout timing will vary by region and carrier. This includes devices running:
Applying this update is critical for user security. Failure to patch could leave devices vulnerable to a range of attacks:
CVE-2025-48593 could allow an attacker to take full control of a device remotely without any user interaction.This update should be considered High Priority for all users. Due to the presence of a critical, zero-click RCE vulnerability, the risk of exploitation is significant. Users should enable automatic updates or manually check for the update and install it immediately.
Settings > Software update.Download and install. If the update is available for your device, it will begin downloading.It is recommended to be connected to a Wi-Fi network before downloading the update to avoid mobile data charges and to ensure your device has at least 50% battery life before starting the installation.
To verify remediation, check the device's security patch level.
| Type | Value | Description |
|---|---|---|
| other | Android Security Patch Level | After the update, the patch level should read 2025-11-01 or later. |
| other | Samsung Knox Version | Check for updated versions of Samsung's security components. |
Applying the monthly security update is the only way to remediate the 45 vulnerabilities addressed in this release.
Mapped D3FEND Techniques:
The sole and essential countermeasure for the 45 vulnerabilities in this release is the application of the November 2025 security patch. Given that this update fixes critical flaws like the zero-click RCE CVE-2025-48593, prompt installation is paramount. Organizations using Samsung devices should leverage their MDM/UEM platforms to enforce the update across their entire mobile fleet. Individual users should enable automatic updates or manually check for and install the update immediately. Delaying this patch leaves devices exposed to remote compromise, privilege escalation, and data theft.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats