Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32330: Information disclosure in Google Android

0
Medium
VulnerabilityCVE-2025-32330cvecve-2025-32330
Published: Thu Sep 04 2025 (09/04/2025, 18:33:55 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In generateRandomPassword of LocalBluetoothLeBroadcast.java, there is a possible way to intercept the Auracast audio stream due to an insecure default value. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/11/2025, 20:16:35 UTC

Technical Analysis

CVE-2025-32330 is a medium-severity information disclosure vulnerability affecting Google Android versions 13, 14, and 15. The flaw exists in the generateRandomPassword function within the LocalBluetoothLeBroadcast.java component, which is responsible for managing Auracast audio streams over Bluetooth LE. The vulnerability arises due to an insecure default value used in generating the password or key material for Auracast broadcasts. This insecure default allows an attacker in close physical proximity (proximal or adjacent) to intercept the Auracast audio stream without requiring any additional execution privileges or user interaction. The attack vector is remote but limited by Bluetooth range, and the attacker only needs to be within wireless range to exploit the flaw. The vulnerability is classified under CWE-1188, which relates to insecure default values leading to information disclosure. The CVSS v3.1 base score is 5.7, reflecting a medium severity level, with the vector indicating low attack complexity, adjacent network attack vector, low privileges required, no user interaction, and high confidentiality impact but no integrity or availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability could allow attackers to eavesdrop on Auracast audio streams, potentially leaking sensitive audio information transmitted over Bluetooth LE broadcasts.

Potential Impact

For European organizations, the impact of CVE-2025-32330 primarily concerns confidentiality breaches of audio data transmitted via Auracast Bluetooth LE broadcasts. Organizations using Android devices (versions 13-15) for Auracast-enabled audio streaming in sensitive environments—such as corporate meetings, healthcare settings, or government facilities—could have confidential conversations or audio content intercepted by nearby attackers. Since no user interaction or elevated privileges are required, the risk of unnoticed eavesdropping is significant in public or semi-public spaces. This could lead to leakage of proprietary information, personal data, or other sensitive audio content. However, the impact is limited by the need for physical proximity to the target device due to Bluetooth range constraints. The vulnerability does not affect data integrity or availability, so it does not enable tampering or denial of service. Nevertheless, the confidentiality breach could undermine trust in Bluetooth Auracast technology and Android devices in professional environments across Europe.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Monitor for official patches or updates from Google addressing CVE-2025-32330 and prioritize timely deployment on all affected Android devices (versions 13-15). 2) Disable Auracast Bluetooth LE broadcasting on Android devices in sensitive or high-risk environments where confidential audio is transmitted, until patches are available. 3) Implement physical security controls to limit unauthorized proximity to devices broadcasting Auracast streams, such as controlled access zones or Bluetooth signal containment measures. 4) Educate users about the risk of nearby attackers intercepting Auracast audio and encourage cautious use of Bluetooth audio broadcasting in public or unsecured areas. 5) Employ network monitoring tools capable of detecting unusual Bluetooth LE broadcast activity or unauthorized devices in proximity. 6) Consider alternative secure audio streaming technologies with stronger encryption and authentication mechanisms if Auracast usage is critical. These steps go beyond generic advice by focusing on controlling physical proximity risks and managing Auracast usage policies specifically.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-04-04T23:30:30.732Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9dcc588499799243c2f26

Added to database: 9/4/2025, 6:39:01 PM

Last enriched: 9/11/2025, 8:16:35 PM

Last updated: 10/18/2025, 5:42:22 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats