Security Experts:

Connect with us

Hi, what are you looking for?


Mobile & Wireless

Google Announces Android Partner Vulnerability Initiative

Google on Friday announced the Android Partner Vulnerability Initiative (APVI), an effort aimed at improving patching of security issues specific to Android OEMs.

Google on Friday announced the Android Partner Vulnerability Initiative (APVI), an effort aimed at improving patching of security issues specific to Android OEMs.

Through the new initiative, the tech giant also expects to improve transparency around vulnerabilities identified by Google’s own researchers, but which impact device models coming from the company’s Android partners.

Google already provides security researchers with various programs through which they can report security issues, such as the Android Security Rewards Program (ASR), which is for reporting vulnerabilities in Android code, and the Google Play Security Rewards Program, for reporting bugs in popular third-party Android apps.

ASR reports that have a broad impact on Android-based devices are delivered to the Android Open Source Project (AOSP) base code, as part of the Android Security Bulletins (ASB), and all partners are required to adopt these security changes for their devices in order to be able to declare a specific month’s Android security patch level (SPL).

“But until recently, we didn’t have a clear way to process Google-discovered security issues outside of AOSP code that are unique to a much smaller set of specific Android OEMs. The APVI aims to close this gap, adding another layer of security for this targeted set of Android OEMs,” Google explains.

All issues discovered within Google and which could potentially impact the security of an Android device are covered by the APVI. A variety of security bugs affecting code not maintained by Google are included here, the company says.

The initiative has already kicked off and various types of security issues have been processed, including permission bypass, code execution within the kernel, leak of credentials, and the generation of unencrypted backups.

As part of the program, Google-discovered vulnerabilities will be publicly disclosed on Google’s Chromium portal. Detailed information on issues that have already been disclosed is also found there.

Related: Android’s September 2020 Patches Fix Critical System Vulnerabilities

Related: Chinese Drone Giant DJI Responds to Disclosure of Android App Security Issues

Related: Critical Bluetooth Vulnerability Exposes Android Devices to Attacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.


GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet