Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0084: Remote code execution in Google Android

0
High
VulnerabilityCVE-2025-0084cvecve-2025-0084
Published: Tue Aug 26 2025 (08/26/2025, 22:48:43 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In multiple locations, there is a possible out of bounds write due to a use after free. This could lead to remote code execution over Bluetooth, if HFP support is enabled, with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/03/2025, 01:08:09 UTC

Technical Analysis

CVE-2025-0084 is a high-severity remote code execution (RCE) vulnerability affecting Google Android versions 13, 14, and 15. The vulnerability arises from a use-after-free condition that leads to an out-of-bounds write in multiple locations within the Bluetooth stack, specifically when Hands-Free Profile (HFP) support is enabled. This flaw allows an attacker to execute arbitrary code remotely over Bluetooth without requiring any additional execution privileges, user interaction, or authentication. The vulnerability is rooted in improper memory management (CWE-416), where memory is freed but later accessed, enabling attackers to manipulate memory and potentially execute malicious payloads. The CVSS v3.1 base score is 8.8, reflecting a high impact on confidentiality, integrity, and availability. Exploitation can occur remotely over Bluetooth, which is a wireless protocol commonly enabled on mobile devices, making the attack vector broad and stealthy. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a critical concern for Android users and organizations relying on Android devices. The lack of user interaction and authentication requirements significantly lowers the barrier for exploitation, increasing the risk profile. The vulnerability affects multiple recent Android versions, indicating a wide range of devices are vulnerable until patched.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Android devices in both consumer and enterprise environments. The ability to execute code remotely over Bluetooth without user interaction means attackers can potentially compromise devices silently, leading to data breaches, espionage, or disruption of services. Confidentiality is at high risk as attackers could access sensitive corporate data stored on devices. Integrity and availability are also threatened since attackers could alter device behavior or cause denial of service. In sectors such as finance, healthcare, and government, where Android devices are used for sensitive communications and operations, the impact could be severe. Additionally, compromised devices could serve as entry points for lateral movement within corporate networks. The vulnerability could also affect IoT devices running Android or Android-based systems, expanding the attack surface. The lack of known exploits currently provides a window for mitigation, but the high severity score and ease of exploitation necessitate immediate attention.

Mitigation Recommendations

Organizations should prioritize updating Android devices to patched versions as soon as Google releases fixes for this vulnerability. Until patches are available, disabling Bluetooth or specifically the Hands-Free Profile (HFP) support on devices where it is not essential can reduce exposure. Network segmentation and restricting Bluetooth usage in sensitive environments can further limit attack vectors. Employing Mobile Device Management (MDM) solutions to enforce security policies, monitor Bluetooth activity, and push updates promptly is recommended. Additionally, educating users about the risks of Bluetooth connections and encouraging them to disable Bluetooth when not in use can help mitigate risk. For critical environments, consider deploying endpoint detection and response (EDR) tools capable of monitoring anomalous Bluetooth-related activities. Regularly auditing device configurations and ensuring minimal privileges for Bluetooth services can also reduce the attack surface. Finally, organizations should prepare incident response plans specific to Bluetooth-based attacks to enable rapid containment and remediation if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2024-12-13T16:56:05.259Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ae3d1bad5a09ad005c3bda

Added to database: 8/26/2025, 11:02:51 PM

Last enriched: 9/3/2025, 1:08:09 AM

Last updated: 10/19/2025, 9:14:41 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats