Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0074: Remote code execution in Google Android

0
Critical
VulnerabilityCVE-2025-0074cvecve-2025-0074
Published: Tue Aug 26 2025 (08/26/2025, 22:48:35 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In process_service_attr_rsp of sdp_discovery.cc, there is a possible way to execute arbitrary code due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/03/2025, 01:07:27 UTC

Technical Analysis

CVE-2025-0074 is a critical remote code execution (RCE) vulnerability affecting Google Android version 15. The flaw exists in the function process_service_attr_rsp within the sdp_discovery.cc source file, which is part of the Bluetooth Service Discovery Protocol (SDP) implementation. The vulnerability is caused by a use-after-free (CWE-416) error, where memory is accessed after it has been freed, leading to undefined behavior that can be exploited to execute arbitrary code remotely. Notably, exploitation requires no user interaction and no additional privileges, making it highly dangerous. An attacker can send a specially crafted Bluetooth SDP response to a vulnerable Android device, triggering the use-after-free condition and gaining the ability to run malicious code with the same privileges as the affected process, potentially compromising the entire device. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation (network vector, no privileges, no user interaction). Although no public exploits have been reported yet, the severity and nature of this vulnerability make it a prime target for attackers once exploit code becomes available. The lack of patch links suggests that a fix may not yet be publicly released, increasing the urgency for mitigation and monitoring.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those relying heavily on Android devices for business operations, communications, and mobile workforce management. The ability to remotely execute code without user interaction or privileges means attackers could compromise devices silently, leading to data breaches, espionage, or disruption of services. Confidential corporate data stored or accessed on Android devices could be exposed or manipulated. Additionally, compromised devices could serve as entry points into corporate networks, facilitating lateral movement and further attacks. The impact extends to critical infrastructure sectors using Android-based systems or IoT devices with similar Bluetooth stacks. Given the widespread use of Android 15 in newer devices, organizations with up-to-date mobile fleets are particularly vulnerable. The threat also affects privacy and regulatory compliance under GDPR, as unauthorized access and data leakage could lead to legal and financial penalties.

Mitigation Recommendations

Immediate mitigation steps include disabling Bluetooth on Android 15 devices where not essential, especially in high-risk environments. Organizations should enforce strict device usage policies limiting Bluetooth connectivity and monitor Bluetooth traffic for anomalous SDP responses. Network segmentation and mobile device management (MDM) solutions should be leveraged to control device configurations and restrict exposure. Until an official patch is released, users should be advised to avoid pairing with unknown or untrusted Bluetooth devices. Security teams should monitor vendor advisories closely for patches and apply them promptly. Additionally, deploying endpoint detection and response (EDR) solutions capable of detecting suspicious Bluetooth-related activities can help identify exploitation attempts. For critical environments, consider temporary use of Android versions not affected by this vulnerability or alternative secure communication methods. Regular security awareness training should emphasize the risks of Bluetooth exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2024-12-13T16:55:21.221Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ae3d1bad5a09ad005c3bb8

Added to database: 8/26/2025, 11:02:51 PM

Last enriched: 9/3/2025, 1:07:27 AM

Last updated: 10/16/2025, 9:32:40 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats