Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36907: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-36907cvecve-2025-36907
Published: Thu Sep 04 2025 (09/04/2025, 04:59:31 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In draw_surface_image() of abl/android/lib/draw/draw.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege via USB fastboot, after a bootloader unlock, with no additional execution privileges needed. User interaction is needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:54:14 UTC

Technical Analysis

CVE-2025-36907 is a vulnerability in the Android kernel specifically within the draw_surface_image() function located in abl/android/lib/draw/draw.c. The issue arises from a heap buffer overflow that causes an out-of-bounds write, classified under CWE-787 and CWE-122, which relate to improper memory operations. This flaw can be exploited locally via USB fastboot interface after the device's bootloader has been unlocked, which is a prerequisite for exploitation. No additional execution privileges are required beyond the ability to interact with the device in fastboot mode, but user interaction is necessary to trigger the vulnerability. The heap overflow can allow an attacker to escalate privileges on the device, potentially gaining kernel-level control. This could lead to complete compromise of the device's confidentiality, integrity, and availability. The CVSS v3.1 base score is 7.3, reflecting high severity with attack vector local, low attack complexity, low privileges required, and user interaction needed. No patches or exploits are currently publicly available, but the vulnerability is published and recognized by Google Devices. This vulnerability primarily affects Android devices with unlocked bootloaders, which is common among developers and advanced users but less so among general consumers. The flaw is significant because it leverages a low-level kernel component accessible via a common device interface (fastboot), which is often used for device recovery and flashing.

Potential Impact

The vulnerability allows an attacker with physical access and an unlocked bootloader to escalate privileges on an Android device, potentially gaining full kernel-level control. This can lead to unauthorized access to sensitive data, modification or deletion of system files, installation of persistent malware, and denial of service by destabilizing the kernel. The requirement for user interaction and an unlocked bootloader limits the attack surface primarily to advanced users or targeted attacks rather than widespread remote exploitation. However, in environments where devices are shared, lost, or stolen, this vulnerability could be exploited to bypass security controls. Organizations relying on Android devices for sensitive communications or operations could face data breaches, operational disruption, and reputational damage if exploited. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as proof-of-concept code could emerge. The impact is particularly critical for sectors with high-value targets such as government, finance, and enterprise mobile deployments.

Mitigation Recommendations

Organizations and users should avoid unlocking bootloaders unless absolutely necessary, as this significantly increases exposure to this vulnerability. Physical security controls should be strengthened to prevent unauthorized access to devices, especially in environments with sensitive data. Users should disable USB debugging and fastboot access when not in use to reduce attack vectors. Monitoring and restricting physical device access in corporate environments is essential. Once patches become available from Google or device manufacturers, they should be applied promptly to remediate the vulnerability. For developers and advanced users who require unlocked bootloaders, consider using additional device encryption and multi-factor authentication to mitigate potential exploitation. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous fastboot or kernel-level activities. Regularly audit device configurations and ensure that devices are updated with the latest security patches. Finally, educate users about the risks of unlocking bootloaders and the importance of physical device security.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Google_Devices
Date Reserved
2025-04-16T00:33:24.576Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b994f6e06fce05ddc05809

Added to database: 9/4/2025, 1:32:38 PM

Last enriched: 2/27/2026, 1:54:14 AM

Last updated: 3/22/2026, 6:56:37 PM

Views: 400

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses