Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27701: Information disclosure in Google Android

0
Medium
VulnerabilityCVE-2025-27701cvecve-2025-27701
Published: Tue May 27 2025 (05/27/2025, 15:42:11 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In the function process_crypto_cmd, the values of ptrs[i] can be potentially equal to NULL which is valid value after calling slice_map_array(). Later this values will be derefenced without prior NULL check, which can lead to local Temporary DoS or OOB Read, leading to information disclosure.

AI-Powered Analysis

AILast updated: 09/04/2025, 18:11:29 UTC

Technical Analysis

CVE-2025-27701 is a medium-severity vulnerability affecting the Android kernel, specifically within the function process_crypto_cmd. The issue arises because the function handles an array of pointers (ptrs[i]) that can potentially be NULL after a call to slice_map_array(). However, these pointers are dereferenced later in the code without a prior NULL check. This improper handling can lead to an out-of-bounds (OOB) read or a local temporary denial of service (DoS). The OOB read can cause information disclosure by allowing an attacker to read memory contents that should not be accessible, potentially leaking sensitive data. The vulnerability is classified under CWE-476 (NULL Pointer Dereference), which typically results in crashes or unintended behavior. The CVSS v3.1 base score is 5.5, indicating a medium severity, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. This means the attack requires local access with low complexity, low privileges, no user interaction, and impacts confidentiality with high impact but no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects the Android kernel, which is a core component of Android devices, implying that devices running vulnerable kernel versions could be impacted. Exploitation requires local access and some privileges, which limits the attack surface primarily to local users or malicious apps with some kernel interaction capabilities.

Potential Impact

For European organizations, the impact of CVE-2025-27701 depends largely on the deployment of Android devices within their environment, particularly those running vulnerable kernel versions. Since the vulnerability allows local attackers to cause temporary denial of service or information disclosure via OOB reads, it could be exploited by malicious insiders or compromised applications to leak sensitive information stored in kernel memory. This could include cryptographic keys or other sensitive data processed by the kernel's crypto subsystem. While the attack requires local access and some privileges, organizations with Bring Your Own Device (BYOD) policies or those that use Android devices for sensitive operations could face risks of data leakage or service disruption. The temporary DoS could impact device availability, potentially disrupting business operations relying on mobile devices. Additionally, the information disclosure could aid attackers in further attacks by revealing kernel memory contents. However, the lack of known exploits and the medium severity score suggest that the immediate risk is moderate. Still, organizations should prioritize patching once fixes become available to prevent escalation of privileges or data leakage in targeted attacks.

Mitigation Recommendations

1. Monitor for official patches or kernel updates from Google and device manufacturers and apply them promptly once available. 2. Restrict local access to Android devices, enforcing strong device access controls and limiting installation of untrusted applications that could exploit this vulnerability. 3. Employ mobile device management (MDM) solutions to enforce security policies, including restricting app permissions and monitoring for suspicious behavior indicative of exploitation attempts. 4. Conduct regular security audits on Android devices used within the organization to ensure they are running updated kernel versions and have no unauthorized modifications. 5. Educate users about the risks of installing untrusted apps and the importance of device security hygiene to reduce the risk of local exploitation. 6. For high-security environments, consider isolating sensitive operations from Android devices or using hardened devices with verified kernel versions. 7. Implement runtime protection mechanisms or kernel integrity monitoring tools where feasible to detect abnormal kernel memory access patterns that could indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Google_Devices
Date Reserved
2025-03-05T19:11:23.389Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6835e152182aa0cae218e508

Added to database: 5/27/2025, 3:59:14 PM

Last enriched: 9/4/2025, 6:11:29 PM

Last updated: 11/21/2025, 7:46:36 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats