Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36900: Elevation of privilege in Google Android

0
Medium
VulnerabilityCVE-2025-36900cvecve-2025-36900
Published: Thu Sep 04 2025 (09/04/2025, 04:56:34 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In lwis_test_register_io of lwis_device_test.c, there is a possible OOB Write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:52:29 UTC

Technical Analysis

CVE-2025-36900 is a vulnerability identified in the Android kernel within the lwis_test_register_io function of the lwis_device_test.c source file. The root cause is an integer overflow that leads to an out-of-bounds (OOB) write operation. This type of memory corruption can allow an attacker to overwrite adjacent memory regions, potentially leading to arbitrary code execution or privilege escalation. The vulnerability requires the attacker to have system execution privileges initially, meaning it is not exploitable from a completely unprivileged state. However, no user interaction is needed, which simplifies exploitation once the attacker has the required privileges. The vulnerability is categorized under CWE-190 (Integer Overflow or Wraparound). The CVSS v3.1 base score is 6.7, reflecting a local attack vector (AV:L), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches or known exploits have been reported at the time of publication, but the risk remains significant due to the potential for privilege escalation on Android devices. This vulnerability affects the Android kernel, which is a critical component of the operating system, making it a valuable target for attackers aiming to gain elevated privileges on mobile devices.

Potential Impact

The primary impact of CVE-2025-36900 is the potential for local privilege escalation on Android devices. An attacker who already has some level of system execution privileges could exploit this vulnerability to gain higher privileges, potentially full kernel-level control. This could lead to unauthorized access to sensitive data, modification or deletion of critical system files, installation of persistent malware, or disruption of device availability. Given the widespread use of Android globally, this vulnerability could affect millions of devices, including smartphones, tablets, and embedded systems running Android. Organizations relying on Android devices for sensitive communications, enterprise mobility, or critical infrastructure could face increased risks of data breaches, espionage, or operational disruption. The absence of required user interaction lowers the barrier for exploitation once initial access is obtained, increasing the threat level for environments where attackers can gain limited system privileges. However, the requirement for high privileges to initiate the exploit limits the scope somewhat, reducing the risk of remote or zero-click attacks.

Mitigation Recommendations

To mitigate CVE-2025-36900, organizations should: 1) Monitor official Google and Android security advisories closely for patches addressing this vulnerability and apply them promptly once available. 2) Restrict system execution privileges to trusted applications and users only, minimizing the number of entities that could exploit this flaw. 3) Employ robust endpoint protection solutions that can detect anomalous kernel-level behavior indicative of exploitation attempts. 4) Implement strict application sandboxing and privilege separation to reduce the likelihood of attackers gaining the initial system execution privileges needed for exploitation. 5) Conduct regular security audits and vulnerability assessments on Android devices, especially those used in sensitive or high-risk environments. 6) Consider deploying mobile device management (MDM) solutions that enforce security policies and can remotely patch or isolate compromised devices. 7) Educate users and administrators about the risks of installing untrusted applications or rooting devices, which can increase exposure to privilege escalation vulnerabilities. These measures, combined with timely patching, will reduce the risk and impact of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Google_Devices
Date Reserved
2025-04-16T00:33:17.231Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b99d8f2a7699688534ae0c

Added to database: 9/4/2025, 2:09:19 PM

Last enriched: 2/27/2026, 1:52:29 AM

Last updated: 3/24/2026, 12:36:08 PM

Views: 180

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses