Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36904: Elevation of privilege in Google Android

0
Critical
VulnerabilityCVE-2025-36904cvecve-2025-36904
Published: Thu Sep 04 2025 (09/04/2025, 04:58:29 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

WLAN in Android before 2025-09-05 on Google Pixel devices allows elevation of privilege, aka A-396458384.

AI-Powered Analysis

AILast updated: 09/11/2025, 20:25:25 UTC

Technical Analysis

CVE-2025-36904 is a critical elevation of privilege vulnerability affecting the WLAN component of the Android kernel on Google Pixel devices running Android versions prior to the security update released on 2025-09-05. The vulnerability allows an attacker to escalate privileges without requiring any user interaction or prior authentication, exploiting a flaw in the handling of WLAN operations within the kernel. Specifically, the weakness relates to improper access control (CWE-269), enabling an attacker to gain higher privileges than intended, potentially achieving full system compromise. The CVSS v3.1 base score of 9.8 reflects the severity, with metrics indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a prime target for exploitation once proof-of-concept code becomes available. The lack of a patch link suggests the update was either newly released or pending at the time of reporting, emphasizing the urgency for affected users to apply the latest security updates promptly. This vulnerability is particularly dangerous because it compromises the kernel, the core of the operating system, potentially allowing attackers to bypass all security mechanisms, install persistent malware, or exfiltrate sensitive data.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those relying on Google Pixel devices for corporate communications, mobile workforce, or sensitive data access. Exploitation could lead to unauthorized access to corporate networks, data breaches, and disruption of business operations. Given the kernel-level compromise, attackers could deploy rootkits or other persistent threats that evade detection by conventional security tools. The impact extends to confidentiality, integrity, and availability of data and services accessed or stored on affected devices. Organizations in sectors such as finance, government, healthcare, and critical infrastructure are particularly vulnerable due to the sensitive nature of their data and the potential for targeted attacks. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within enterprise networks, increasing the overall risk posture. The absence of required user interaction or privileges lowers the barrier for exploitation, making it feasible for remote attackers to compromise devices silently.

Mitigation Recommendations

European organizations should immediately verify the deployment of Google Pixel devices within their environment and ensure all devices are updated to the latest Android security patch released on or after 2025-09-05. Network administrators should implement strict network segmentation and monitor WLAN traffic for anomalous behavior indicative of exploitation attempts. Employ endpoint detection and response (EDR) solutions capable of detecting kernel-level anomalies and privilege escalation attempts. Restrict the use of Google Pixel devices for accessing highly sensitive systems until patches are confirmed applied. Additionally, enforce policies to limit WLAN connectivity to trusted networks only and consider disabling WLAN interfaces on devices where wireless connectivity is not essential. Regularly audit device compliance and educate users on the importance of timely updates. For organizations with mobile device management (MDM) solutions, enforce mandatory update policies and monitor patch deployment status. Finally, maintain up-to-date incident response plans to quickly address potential compromises stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Google_Devices
Date Reserved
2025-04-16T00:33:17.233Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b986c1a992e2db914fa0be

Added to database: 9/4/2025, 12:32:01 PM

Last enriched: 9/11/2025, 8:25:25 PM

Last updated: 10/19/2025, 9:18:50 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats