Skip to main content

CVE-2025-0092: Information disclosure in Google Android

Medium
VulnerabilityCVE-2025-0092cvecve-2025-0092
Published: Tue Aug 26 2025 (08/26/2025, 22:48:45 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In handleBondStateChanged of AdapterService.java, there is a possible permission bypass due to misleading or insufficient UI. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.

AI-Powered Analysis

AILast updated: 09/03/2025, 01:12:42 UTC

Technical Analysis

CVE-2025-0092 is a medium-severity information disclosure vulnerability affecting multiple recent versions of the Google Android operating system, specifically versions 12, 12L, 13, 14, and 15. The vulnerability exists in the handleBondStateChanged method within AdapterService.java, a component responsible for managing Bluetooth adapter state changes. The root cause is a permission bypass triggered by misleading or insufficient user interface cues, which can cause the system to disclose sensitive information to a proximate or adjacent attacker without requiring additional execution privileges. Exploitation requires user interaction, meaning the victim must perform some action, such as accepting a Bluetooth pairing request or interacting with a UI element that triggers the vulnerable code path. The CVSS v3.1 base score is 6.5, reflecting a network attack vector (remote but proximal via Bluetooth), low attack complexity, no privileges required, but user interaction is necessary. The impact is high on confidentiality, as sensitive information can be leaked, but there is no impact on integrity or availability. The vulnerability relates to CWE-345 (Insufficient Verification of Data Authenticity) and CWE-356 (Missing Authentication for Critical Function). No known exploits are currently in the wild, and no official patches have been linked yet, indicating that mitigation may rely on upcoming Android security updates or vendor patches. This vulnerability highlights a UI design flaw that can mislead users into unintentionally enabling information disclosure through Bluetooth bonding state changes.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality of sensitive data on Android devices. Since Android is widely used across Europe in both consumer and enterprise environments, especially on mobile devices and IoT endpoints, attackers in physical proximity could exploit this flaw to glean sensitive information without elevated privileges. This could affect corporate data confidentiality, especially in sectors where mobile device usage is high, such as finance, healthcare, and government. The requirement for user interaction limits large-scale automated exploitation but does not eliminate targeted attacks, particularly in environments where Bluetooth is commonly enabled and users may accept pairing requests or interact with UI prompts without full awareness. The lack of impact on integrity and availability reduces the risk of disruption or data tampering, but information leakage could facilitate further attacks or espionage. Organizations with Bring Your Own Device (BYOD) policies or extensive mobile workforces should be particularly cautious. The vulnerability also raises privacy concerns under GDPR if personal or sensitive data is exposed without consent.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Ensure all Android devices are updated promptly once Google or device manufacturers release patches addressing CVE-2025-0092. 2) Educate users about the risks of accepting unexpected Bluetooth pairing requests or interacting with suspicious UI prompts related to Bluetooth bonding. 3) Implement mobile device management (MDM) policies to restrict or monitor Bluetooth usage, especially in sensitive environments, including disabling Bluetooth when not needed or enforcing strict pairing policies. 4) Use endpoint security solutions capable of detecting anomalous Bluetooth activity or unauthorized attempts to access Bluetooth services. 5) For critical environments, consider restricting physical access to devices to prevent proximal attackers from exploiting Bluetooth vulnerabilities. 6) Monitor security advisories from Google and Android OEMs for updates and apply them as soon as available. 7) Conduct regular security awareness training emphasizing the importance of cautious user interaction with device prompts that could lead to information disclosure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2024-12-13T16:56:15.782Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ae3d1cad5a09ad005c3bec

Added to database: 8/26/2025, 11:02:52 PM

Last enriched: 9/3/2025, 1:12:42 AM

Last updated: 9/3/2025, 1:12:42 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats