CVE-2025-36911: Information disclosure in Google Android
In key-based pairing, there is a possible ID due to a logic error in the code. This could lead to remote (proximal/adjacent) information disclosure of user's conversations and location with no additional execution privileges needed. User interaction is not needed for exploitation.
AI Analysis
Technical Summary
CVE-2025-36911 is a vulnerability identified in the Android kernel's key-based pairing process, specifically caused by a logic error in the code managing identifiers during pairing. This flaw allows an attacker in close physical proximity—such as within Bluetooth range—to remotely disclose sensitive information including users' conversations and location data. The vulnerability does not require any additional execution privileges or user interaction, making it particularly dangerous as it can be exploited silently. The root cause is a mishandling of identifiers in the pairing logic, which leads to unintended information leakage. The affected product is the Android kernel, impacting a broad range of Android devices that utilize key-based pairing for Bluetooth or similar wireless connections. Although no known exploits have been reported in the wild, the potential for abuse is significant given the sensitive nature of the data exposed. The vulnerability was reserved in April 2025 and published in January 2026, but no CVSS score or patch links have been provided yet. The lack of authentication requirements and the proximity-based remote attack vector increase the risk profile. This vulnerability threatens confidentiality primarily, with potential indirect impacts on user privacy and trust. The absence of user interaction requirements means that exploitation can occur without alerting the victim, increasing the stealth and effectiveness of potential attacks.
Potential Impact
For European organizations, the impact of CVE-2025-36911 is primarily on the confidentiality of sensitive communications and location data. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on Android devices for secure communication and location tracking are at heightened risk. The exposure of conversation content and location information could lead to espionage, targeted attacks, or privacy violations. Since the vulnerability can be exploited remotely by an attacker in proximity, physical security controls around sensitive environments become critical. The lack of required user interaction or elevated privileges means that attackers can operate stealthily, increasing the risk of undetected data leakage. Additionally, the widespread use of Android devices across European enterprises and consumers amplifies the potential attack surface. The vulnerability could also undermine trust in mobile communications and location-based services, impacting business operations and regulatory compliance, especially under GDPR requirements for data protection.
Mitigation Recommendations
To mitigate CVE-2025-36911, European organizations should: 1) Monitor for and promptly apply official security patches from Google or device manufacturers once they become available. 2) Temporarily disable or restrict key-based pairing features in Bluetooth settings where feasible, especially in high-security environments. 3) Implement strict physical security controls to limit attacker proximity to sensitive devices, including shielding or controlled access zones. 4) Employ network segmentation and device management policies to isolate vulnerable Android devices from critical networks. 5) Use endpoint detection and response (EDR) tools to monitor for unusual Bluetooth activity or pairing attempts. 6) Educate users about the risks of unauthorized Bluetooth connections and encourage disabling Bluetooth when not in use. 7) Coordinate with mobile device management (MDM) solutions to enforce security configurations and rapid patch deployment. 8) Conduct regular security audits focusing on wireless communication channels and device configurations. These measures go beyond generic advice by focusing on the specific attack vector and operational context of the vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2025-36911: Information disclosure in Google Android
Description
In key-based pairing, there is a possible ID due to a logic error in the code. This could lead to remote (proximal/adjacent) information disclosure of user's conversations and location with no additional execution privileges needed. User interaction is not needed for exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2025-36911 is a vulnerability identified in the Android kernel's key-based pairing process, specifically caused by a logic error in the code managing identifiers during pairing. This flaw allows an attacker in close physical proximity—such as within Bluetooth range—to remotely disclose sensitive information including users' conversations and location data. The vulnerability does not require any additional execution privileges or user interaction, making it particularly dangerous as it can be exploited silently. The root cause is a mishandling of identifiers in the pairing logic, which leads to unintended information leakage. The affected product is the Android kernel, impacting a broad range of Android devices that utilize key-based pairing for Bluetooth or similar wireless connections. Although no known exploits have been reported in the wild, the potential for abuse is significant given the sensitive nature of the data exposed. The vulnerability was reserved in April 2025 and published in January 2026, but no CVSS score or patch links have been provided yet. The lack of authentication requirements and the proximity-based remote attack vector increase the risk profile. This vulnerability threatens confidentiality primarily, with potential indirect impacts on user privacy and trust. The absence of user interaction requirements means that exploitation can occur without alerting the victim, increasing the stealth and effectiveness of potential attacks.
Potential Impact
For European organizations, the impact of CVE-2025-36911 is primarily on the confidentiality of sensitive communications and location data. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on Android devices for secure communication and location tracking are at heightened risk. The exposure of conversation content and location information could lead to espionage, targeted attacks, or privacy violations. Since the vulnerability can be exploited remotely by an attacker in proximity, physical security controls around sensitive environments become critical. The lack of required user interaction or elevated privileges means that attackers can operate stealthily, increasing the risk of undetected data leakage. Additionally, the widespread use of Android devices across European enterprises and consumers amplifies the potential attack surface. The vulnerability could also undermine trust in mobile communications and location-based services, impacting business operations and regulatory compliance, especially under GDPR requirements for data protection.
Mitigation Recommendations
To mitigate CVE-2025-36911, European organizations should: 1) Monitor for and promptly apply official security patches from Google or device manufacturers once they become available. 2) Temporarily disable or restrict key-based pairing features in Bluetooth settings where feasible, especially in high-security environments. 3) Implement strict physical security controls to limit attacker proximity to sensitive devices, including shielding or controlled access zones. 4) Employ network segmentation and device management policies to isolate vulnerable Android devices from critical networks. 5) Use endpoint detection and response (EDR) tools to monitor for unusual Bluetooth activity or pairing attempts. 6) Educate users about the risks of unauthorized Bluetooth connections and encourage disabling Bluetooth when not in use. 7) Coordinate with mobile device management (MDM) solutions to enforce security configurations and rapid patch deployment. 8) Conduct regular security audits focusing on wireless communication channels and device configurations. These measures go beyond generic advice by focusing on the specific attack vector and operational context of the vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Google_Devices
- Date Reserved
- 2025-04-16T00:33:24.577Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 696929a053752d4047c61cdb
Added to database: 1/15/2026, 5:53:36 PM
Last enriched: 1/15/2026, 6:08:10 PM
Last updated: 1/15/2026, 7:18:12 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22774: CWE-405: Asymmetric Resource Consumption (Amplification) in sveltejs devalue
HighCVE-2026-22775: CWE-405: Asymmetric Resource Consumption (Amplification) in sveltejs devalue
HighCVE-2025-70303: n/a
MediumCVE-2025-67647: CWE-248: Uncaught Exception in sveltejs kit
HighCVE-2025-13845: CWE-416 Use After Free in Schneider Electric EcoStruxure Power Build Rapsody
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.