Skip to main content

CVE-2025-0074: Remote code execution in Google Android

Unknown
VulnerabilityCVE-2025-0074cvecve-2025-0074
Published: Tue Aug 26 2025 (08/26/2025, 22:48:35 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In process_service_attr_rsp of sdp_discovery.cc, there is a possible way to execute arbitrary code due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 08/26/2025, 23:22:22 UTC

Technical Analysis

CVE-2025-0074 is a critical remote code execution (RCE) vulnerability affecting Google Android version 15. The flaw exists in the function process_service_attr_rsp within the sdp_discovery.cc source file, which is part of the Bluetooth Service Discovery Protocol (SDP) implementation. The vulnerability arises due to a use-after-free condition, where memory is accessed after it has been freed, leading to undefined behavior. An attacker can exploit this flaw to execute arbitrary code remotely on the affected device without requiring any additional execution privileges or user interaction. This means the exploit can be triggered silently, potentially allowing attackers to take full control over the device. The vulnerability does not require the victim to open a malicious file or click on a link, making it highly dangerous and suitable for automated exploitation. Although no known exploits are currently reported in the wild, the technical details and nature of the vulnerability suggest that it could be weaponized quickly given the widespread use of Android 15. The lack of a CVSS score indicates that the vulnerability is newly published and pending further analysis, but the characteristics point to a severe security risk.

Potential Impact

For European organizations, the impact of CVE-2025-0074 could be substantial. Android devices are widely used across enterprises and by employees for both personal and professional purposes. A successful exploitation could lead to full compromise of affected devices, enabling attackers to steal sensitive corporate data, intercept communications, deploy malware, or pivot into internal networks. The fact that no user interaction is required increases the risk of widespread compromise, especially in environments where Bluetooth is enabled by default. This could disrupt business operations, lead to data breaches subject to GDPR penalties, and damage organizational reputation. Additionally, critical sectors such as finance, healthcare, and government agencies in Europe that rely on Android devices for secure communications and operations could face heightened risks. The vulnerability could also be leveraged for espionage or sabotage given the strategic importance of some European industries and institutions.

Mitigation Recommendations

To mitigate CVE-2025-0074, European organizations should prioritize the following actions: 1) Immediately apply any official patches or security updates released by Google for Android 15 once available. 2) Temporarily disable Bluetooth on all Android devices where feasible, especially in high-risk environments, to reduce the attack surface. 3) Implement mobile device management (MDM) solutions to enforce security policies, including restricting Bluetooth usage and monitoring device behavior for anomalies. 4) Educate users about the risks of leaving Bluetooth enabled in public or untrusted environments. 5) Conduct network segmentation to limit potential lateral movement from compromised devices. 6) Monitor security advisories and threat intelligence feeds for any emerging exploit code or attack campaigns related to this vulnerability. 7) For organizations deploying custom Android builds or managing device fleets, perform thorough security testing to detect any exploitation attempts. These measures go beyond generic advice by focusing on controlling Bluetooth exposure and leveraging enterprise security controls to contain potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2024-12-13T16:55:21.221Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ae3d1bad5a09ad005c3bb8

Added to database: 8/26/2025, 11:02:51 PM

Last enriched: 8/26/2025, 11:22:22 PM

Last updated: 8/27/2025, 12:34:24 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats