Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0093: Information disclosure in Google Android

0
High
VulnerabilityCVE-2025-0093cvecve-2025-0093
Published: Tue Aug 26 2025 (08/26/2025, 22:48:46 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In handleBondStateChanged of AdapterService.java, there is a possible unapproved data access due to a missing permission check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.

AI-Powered Analysis

AILast updated: 09/03/2025, 01:12:54 UTC

Technical Analysis

CVE-2025-0093 is a high-severity information disclosure vulnerability affecting multiple recent versions of the Google Android operating system, specifically versions 12, 12L, 13, 14, and 15. The vulnerability resides in the handleBondStateChanged method within the AdapterService.java component, which is part of the Bluetooth stack. The root cause is a missing permission check that allows unapproved access to sensitive data. This flaw enables a remote attacker to disclose information without requiring any elevated execution privileges. However, exploitation requires user interaction, meaning the victim must perform some action, such as accepting a Bluetooth pairing request or interacting with a malicious device. The vulnerability is classified under CWE-732, which relates to incorrect permission assignment or enforcement. The CVSS v3.1 base score is 7.5, indicating a high severity level, with an attack vector of network (remote), low attack complexity, no privileges required, no user interaction according to the vector, but the description clarifies that user interaction is needed for exploitation. The impact is limited to confidentiality as it allows unauthorized disclosure of information, without affecting integrity or availability. No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. Given the affected Android versions, this vulnerability impacts a broad range of devices, including many smartphones and tablets in active use worldwide. The Bluetooth component is widely used for device pairing and data exchange, so this flaw could be leveraged to extract sensitive information from devices within Bluetooth range, potentially including personal data or device identifiers.

Potential Impact

For European organizations, the impact of CVE-2025-0093 could be significant, especially for enterprises relying on Android devices for business operations, communications, or as part of their IoT infrastructure. The information disclosure could lead to leakage of sensitive corporate data, user credentials, or device metadata, which could facilitate further targeted attacks or espionage. Organizations with employees using vulnerable Android devices in proximity to untrusted Bluetooth devices or networks are at risk. This is particularly relevant for sectors with high data sensitivity such as finance, healthcare, government, and critical infrastructure. The requirement for user interaction somewhat limits the risk but does not eliminate it, as social engineering or phishing techniques could be used to trick users into enabling the exploit. Additionally, the widespread use of Android devices across Europe means that the attack surface is large. The vulnerability could also impact consumer privacy, which is a critical concern under the GDPR framework, potentially leading to regulatory and reputational consequences if personal data is exposed.

Mitigation Recommendations

To mitigate CVE-2025-0093, European organizations should prioritize the following actions: 1) Monitor for official patches or updates from Google and Android device manufacturers and deploy them promptly across all affected devices. 2) Implement strict Bluetooth usage policies, including disabling Bluetooth when not in use and restricting pairing to trusted devices only. 3) Educate users about the risks of interacting with unknown Bluetooth devices and the importance of cautious behavior regarding pairing requests or prompts. 4) Employ mobile device management (MDM) solutions to enforce security configurations, monitor Bluetooth activity, and restrict installation of unauthorized apps that could facilitate exploitation. 5) Conduct regular security assessments and penetration tests focusing on Bluetooth attack vectors to identify and remediate potential exposure. 6) Where possible, segment networks and isolate critical systems from devices that may be vulnerable to Bluetooth-based attacks. 7) Enhance endpoint detection and response (EDR) capabilities to detect anomalous Bluetooth-related activities that could indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2024-12-13T16:56:16.980Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ae3d1cad5a09ad005c3bf0

Added to database: 8/26/2025, 11:02:52 PM

Last enriched: 9/3/2025, 1:12:54 AM

Last updated: 10/18/2025, 1:35:52 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats