CVE-2025-32330: Information disclosure in Google Android
In generateRandomPassword of LocalBluetoothLeBroadcast.java, there is a possible way to intercept the Auracast audio stream due to an insecure default value. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
AI Analysis
Technical Summary
CVE-2025-32330 is a medium-severity information disclosure vulnerability affecting Google Android versions 13, 14, and 15. The flaw exists in the generateRandomPassword function within the LocalBluetoothLeBroadcast.java component, which is responsible for managing Auracast audio streams over Bluetooth LE. The vulnerability arises due to an insecure default value used in generating the password or key material for Auracast broadcasts. This insecure default allows an attacker in close physical proximity (proximal or adjacent) to intercept the Auracast audio stream without requiring any additional execution privileges or user interaction. The attack vector is remote but limited by Bluetooth range, and the attacker only needs to be within wireless range to exploit the flaw. The vulnerability is classified under CWE-1188, which relates to insecure default values leading to information disclosure. The CVSS v3.1 base score is 5.7, reflecting a medium severity level, with the vector indicating low attack complexity, adjacent network attack vector, low privileges required, no user interaction, and high confidentiality impact but no integrity or availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability could allow attackers to eavesdrop on Auracast audio streams, potentially leaking sensitive audio information transmitted over Bluetooth LE broadcasts.
Potential Impact
For European organizations, the impact of CVE-2025-32330 primarily concerns confidentiality breaches of audio data transmitted via Auracast Bluetooth LE broadcasts. Organizations using Android devices (versions 13-15) for Auracast-enabled audio streaming in sensitive environments—such as corporate meetings, healthcare settings, or government facilities—could have confidential conversations or audio content intercepted by nearby attackers. Since no user interaction or elevated privileges are required, the risk of unnoticed eavesdropping is significant in public or semi-public spaces. This could lead to leakage of proprietary information, personal data, or other sensitive audio content. However, the impact is limited by the need for physical proximity to the target device due to Bluetooth range constraints. The vulnerability does not affect data integrity or availability, so it does not enable tampering or denial of service. Nevertheless, the confidentiality breach could undermine trust in Bluetooth Auracast technology and Android devices in professional environments across Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Monitor for official patches or updates from Google addressing CVE-2025-32330 and prioritize timely deployment on all affected Android devices (versions 13-15). 2) Disable Auracast Bluetooth LE broadcasting on Android devices in sensitive or high-risk environments where confidential audio is transmitted, until patches are available. 3) Implement physical security controls to limit unauthorized proximity to devices broadcasting Auracast streams, such as controlled access zones or Bluetooth signal containment measures. 4) Educate users about the risk of nearby attackers intercepting Auracast audio and encourage cautious use of Bluetooth audio broadcasting in public or unsecured areas. 5) Employ network monitoring tools capable of detecting unusual Bluetooth LE broadcast activity or unauthorized devices in proximity. 6) Consider alternative secure audio streaming technologies with stronger encryption and authentication mechanisms if Auracast usage is critical. These steps go beyond generic advice by focusing on controlling physical proximity risks and managing Auracast usage policies specifically.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Finland
CVE-2025-32330: Information disclosure in Google Android
Description
In generateRandomPassword of LocalBluetoothLeBroadcast.java, there is a possible way to intercept the Auracast audio stream due to an insecure default value. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2025-32330 is a medium-severity information disclosure vulnerability affecting Google Android versions 13, 14, and 15. The flaw exists in the generateRandomPassword function within the LocalBluetoothLeBroadcast.java component, which is responsible for managing Auracast audio streams over Bluetooth LE. The vulnerability arises due to an insecure default value used in generating the password or key material for Auracast broadcasts. This insecure default allows an attacker in close physical proximity (proximal or adjacent) to intercept the Auracast audio stream without requiring any additional execution privileges or user interaction. The attack vector is remote but limited by Bluetooth range, and the attacker only needs to be within wireless range to exploit the flaw. The vulnerability is classified under CWE-1188, which relates to insecure default values leading to information disclosure. The CVSS v3.1 base score is 5.7, reflecting a medium severity level, with the vector indicating low attack complexity, adjacent network attack vector, low privileges required, no user interaction, and high confidentiality impact but no integrity or availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability could allow attackers to eavesdrop on Auracast audio streams, potentially leaking sensitive audio information transmitted over Bluetooth LE broadcasts.
Potential Impact
For European organizations, the impact of CVE-2025-32330 primarily concerns confidentiality breaches of audio data transmitted via Auracast Bluetooth LE broadcasts. Organizations using Android devices (versions 13-15) for Auracast-enabled audio streaming in sensitive environments—such as corporate meetings, healthcare settings, or government facilities—could have confidential conversations or audio content intercepted by nearby attackers. Since no user interaction or elevated privileges are required, the risk of unnoticed eavesdropping is significant in public or semi-public spaces. This could lead to leakage of proprietary information, personal data, or other sensitive audio content. However, the impact is limited by the need for physical proximity to the target device due to Bluetooth range constraints. The vulnerability does not affect data integrity or availability, so it does not enable tampering or denial of service. Nevertheless, the confidentiality breach could undermine trust in Bluetooth Auracast technology and Android devices in professional environments across Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Monitor for official patches or updates from Google addressing CVE-2025-32330 and prioritize timely deployment on all affected Android devices (versions 13-15). 2) Disable Auracast Bluetooth LE broadcasting on Android devices in sensitive or high-risk environments where confidential audio is transmitted, until patches are available. 3) Implement physical security controls to limit unauthorized proximity to devices broadcasting Auracast streams, such as controlled access zones or Bluetooth signal containment measures. 4) Educate users about the risk of nearby attackers intercepting Auracast audio and encourage cautious use of Bluetooth audio broadcasting in public or unsecured areas. 5) Employ network monitoring tools capable of detecting unusual Bluetooth LE broadcast activity or unauthorized devices in proximity. 6) Consider alternative secure audio streaming technologies with stronger encryption and authentication mechanisms if Auracast usage is critical. These steps go beyond generic advice by focusing on controlling physical proximity risks and managing Auracast usage policies specifically.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- google_android
- Date Reserved
- 2025-04-04T23:30:30.732Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b9dcc588499799243c2f26
Added to database: 9/4/2025, 6:39:01 PM
Last enriched: 9/11/2025, 8:16:35 PM
Last updated: 10/18/2025, 5:42:22 PM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownCVE-2025-11926: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdreams Related Posts Lite
MediumCVE-2025-9890: CWE-352 Cross-Site Request Forgery (CSRF) in mndpsingh287 Theme Editor
HighCVE-2025-5555: Stack-based Buffer Overflow in Nixdorf Wincor PORT IO Driver
HighCVE-2025-11256: CWE-285 Improper Authorization in kognetiks Kognetiks Chatbot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.