Google is changing how Android handles security updates, boosting the pressure on device makers to roll out patches even faster, among other things. What was once a predictable monthly release of patches has evolved into you-had-better-start-patching-now-ro they’re coming-a-chance-every-four-weeks-or-more cadence that prioritizes the most dangerous flaws first.
The new process channels ‘in-production’ actively exploited or chain-able vulnerabilities into monthly releases while sweeping up the rest into larger, predictable quarterly drops. The trend is already visible in the bulletins: one recent month had zero listed CVEs, followed a short time later by an enormous bulletin with far more than 100 entries.

The aim is simple: to get essential protections to users sooner, reduce churn and distraction among manufacturers and keep the focus on threats in the real world. It is a major procedural change for an ecosystem that has thousands of device variants and long, circuitous supply chains to software.
What “risk-based” actually changes
Formerly, the Android Security Bulletin contained all applicable patches each month—all vulnerabilities, no matter how practical they were. Under the risk-based model, monthly bulletins contain only vulnerabilities for which there is a need to rush out-of-band patches – like security holes under active exploitation, bugs that complete known exploit chains or flaws with concrete evidence of widespread abuse. Less-risky fixes are waiting for the next quarterly bulletin.
What is “risk”?Note that when we say “risk” here, we are not talking about the CVSS score, nor the severity designation you read in NVD (i.e. high, medium, etc.). A vulnerability classified “High” on paper may not meet the grade during the month’s push if it has limited potential to be exploited in the wild and a “Moderate” issue could make the cut if it opens up an especially useful attack path. That converges Android’s patch flow with the reality of how defenders and attackers operate.
How the bulletin pipeline is changing
Android’s patches are still traveling through a two-step disclosure process: A private (for partners to integrate and test their updates) bulletin and a public one where fixes are ready to ship. Google doesn’t post source code immediately to the Android Open Source Project when doing so would reveal a vulnerability without an available patch for all devices—a practice that’s been around for as long as I can remember with coordinated disclosure, and one also used by other platforms.
The new twist is distribution. If a component lives in a Project Mainline module, Google can easily ship it across a wide variety of devices using Google Play System Update. Everything else is dependent on whether or not the OEM updates, which again is where that risk-based split comes in. Monthly payloads are now smaller and have urgent needs; quarterly ones are larger, more comprehensive. That combination provides partners with fewer moving pieces to certify each month while keeping the most nefarious threats at the front of line.
This strategy sits on top of wider hardening work: more use of memory-safe Rust in system components, hardware-backed control-flow integrity, and memory tagging. Google has posted a steady decrease in memory safety bugs as Rust becomes more popular, pattern that is also reflected in Project Zero exploitability research. A smaller set of bug classes and a smarter triage will almost always mean fewer emergency fires.
What it means to OEMs and users
The advantages for the device makers are mundane. Many brands struggle to keep their monthly patches maintained across huge portfolios, regional variations and carrier certs already. “Focusing the non-time-critical fixes into quarterly drops takes pressure off repeat testing routines, whilst ensuring what is critical (really and truly) goes out on a monthly cadence.” The message is straightforward: at least ship the quarterly security release; if a monthly bulletin raises a high-risk issue, hop to it.

For users on phones with monthly patches — most recent flagships will fall into this category — updates will continue to come, but some months may be nearly absent of fixes while others will bring none at all.
Everyone else, the bigger quarterly cycles should have more heft. The public CVE tallies and tables should also seem different: a quiet month does not mean “no bugs,” and conversely, just because you see one jumbo bulletin, you should not think that it’s crikeysville-looming-up-ahead-of-us time. It’s simply the new packaging.
Enterprises get a more defined playbook as well. Mapping mobile compliance checks to the quarterly baseline, with quick trips for any monthly high-risk items that pop up, would align nicely with how many organizations already address CISA’s Known Exploited Vulnerabilities catalog — prioritizing the actively abused first and mopping up the remainder on a routine.
Trade-offs and open questions
There are two tensions security engineers should take note of. For one, larger accounts will get access to pre-release details for a longer time due to the increased lead time on the quarterly bullets. Even with its private bulletins tightly managed, a multi-party process always runs some risk of leaked information. That’s why we need to prioritize in-the-wild exploits on a monthly basis — narrow the window of when it counts.
Second, the reduction in source drops to many changes was moved to the quarterly cadence and means independent Android projects and custom ROMs have just a few windows to ship for monthly security maintenance. Privacy-focused distributions like GrapheneOS have expressed this concern previously: a slower code cadence in the public can muddy downstream patching even if binary updates on commercial devices proceed at pace.
There is also the baseband wild card. Modem and firmware vulnerabilities, which are often logged by MITRE and NIST but updated by chipset manufacturers, can be pivotal but difficult for OEMs to quickly turn around. A risk-bladed pipeline could help expose those earlier in the monthly cycle, but delivery ultimately depends upon vendor preparedness and carrier certification.
The bottom line
Android’s update regimen is starting to catch up to how risk is managed in the real world: fix whatever’s being used against users, first; sweep up the rest on a drumbeat schedule. Look for quieter months, meatier quarterlies and quicker response times to in-the-wild threats. The unit of success won’t be the size of a bulletin, it will be the time it takes to go from bug intimation to patch deployed on real devices.
If you want the safest experience possible, go with devices that have well-defined extended support commitments, a demonstrated history of prompt monthly update availability and reputable vendor track records. For the overall ecosystem, a risk-based model represents a practical step toward achieving that more consistent safety — without flooding those factory lines that need to keep shipping it.