Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36901: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-36901cvecve-2025-36901
Published: Thu Sep 04 2025 (09/04/2025, 04:56:59 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

WLAN in Android before 2025-09-05 on Google Pixel devices allows elevation of privilege, aka A-396462223.

AI-Powered Analysis

AILast updated: 09/11/2025, 20:24:46 UTC

Technical Analysis

CVE-2025-36901 is a high-severity elevation of privilege vulnerability affecting the WLAN component in the Android kernel on Google Pixel devices running Android versions prior to the 2025-09-05 security update. The vulnerability allows an attacker to escalate privileges without requiring prior authentication or user interaction, exploiting a weakness in the WLAN subsystem of the Android kernel. Specifically, this vulnerability is categorized under CWE-269, which relates to improper privilege management, indicating that the flaw allows unauthorized access or actions that should be restricted. The CVSS v3.1 base score of 8.8 reflects the critical nature of this vulnerability, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H), integrity (I:H), and availability (A:H). Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk, especially for devices used in sensitive environments. The lack of a published patch link at the time of reporting suggests that affected users should prioritize updating their devices as soon as an official fix is available. The vulnerability's presence in the Android kernel WLAN component means that exploitation could allow attackers to gain kernel-level privileges, potentially leading to full device compromise, unauthorized data access, or disruption of device functionality.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, particularly for those relying on Google Pixel devices within their mobile device fleets. The ability to elevate privileges without authentication or user interaction means that attackers could exploit this flaw remotely from an adjacent network, such as a compromised Wi-Fi network or a malicious hotspot. This could lead to unauthorized access to sensitive corporate data, disruption of mobile services, or use of compromised devices as footholds for lateral movement within enterprise networks. Given the high impact on confidentiality, integrity, and availability, organizations handling sensitive personal data or critical business operations could face data breaches, operational downtime, and reputational damage. Furthermore, sectors such as finance, healthcare, and government agencies in Europe, which often use mobile devices for secure communications and data access, are particularly vulnerable. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score underscores the urgency of addressing this vulnerability promptly.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy: 1) Immediate inventory and identification of all Google Pixel devices running affected Android kernel versions within the organization. 2) Prioritize deployment of the official security update from Google as soon as it becomes available to patch the vulnerability. 3) Until patches are applied, restrict access to untrusted or public Wi-Fi networks, especially those that are adjacent to the organization's network environment, to reduce exposure to potential exploitation vectors. 4) Employ network segmentation and enforce strict access controls on wireless networks to limit the ability of attackers to reach vulnerable devices. 5) Monitor network traffic for unusual WLAN activity that could indicate exploitation attempts. 6) Educate users about the risks of connecting to unknown or unsecured Wi-Fi networks and encourage the use of VPNs when accessing corporate resources remotely. 7) Consider deploying Mobile Device Management (MDM) solutions to enforce security policies, manage updates, and remotely respond to incidents involving affected devices. These targeted actions go beyond generic advice by focusing on the specific attack vector and device ecosystem involved in this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Google_Devices
Date Reserved
2025-04-16T00:33:17.232Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b986c1a992e2db914fa0bb

Added to database: 9/4/2025, 12:32:01 PM

Last enriched: 9/11/2025, 8:24:46 PM

Last updated: 10/18/2025, 11:58:24 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats