Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36911: Information disclosure in Google Android

0
High
VulnerabilityCVE-2025-36911cvecve-2025-36911
Published: Thu Jan 15 2026 (01/15/2026, 17:41:57 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In key-based pairing, there is a possible ID due to a logic error in the code. This could lead to remote (proximal/adjacent) information disclosure of user's conversations and location with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 01/15/2026, 18:08:10 UTC

Technical Analysis

CVE-2025-36911 is a vulnerability identified in the Android kernel's key-based pairing process, specifically caused by a logic error in the code managing identifiers during pairing. This flaw allows an attacker in close physical proximity—such as within Bluetooth range—to remotely disclose sensitive information including users' conversations and location data. The vulnerability does not require any additional execution privileges or user interaction, making it particularly dangerous as it can be exploited silently. The root cause is a mishandling of identifiers in the pairing logic, which leads to unintended information leakage. The affected product is the Android kernel, impacting a broad range of Android devices that utilize key-based pairing for Bluetooth or similar wireless connections. Although no known exploits have been reported in the wild, the potential for abuse is significant given the sensitive nature of the data exposed. The vulnerability was reserved in April 2025 and published in January 2026, but no CVSS score or patch links have been provided yet. The lack of authentication requirements and the proximity-based remote attack vector increase the risk profile. This vulnerability threatens confidentiality primarily, with potential indirect impacts on user privacy and trust. The absence of user interaction requirements means that exploitation can occur without alerting the victim, increasing the stealth and effectiveness of potential attacks.

Potential Impact

For European organizations, the impact of CVE-2025-36911 is primarily on the confidentiality of sensitive communications and location data. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on Android devices for secure communication and location tracking are at heightened risk. The exposure of conversation content and location information could lead to espionage, targeted attacks, or privacy violations. Since the vulnerability can be exploited remotely by an attacker in proximity, physical security controls around sensitive environments become critical. The lack of required user interaction or elevated privileges means that attackers can operate stealthily, increasing the risk of undetected data leakage. Additionally, the widespread use of Android devices across European enterprises and consumers amplifies the potential attack surface. The vulnerability could also undermine trust in mobile communications and location-based services, impacting business operations and regulatory compliance, especially under GDPR requirements for data protection.

Mitigation Recommendations

To mitigate CVE-2025-36911, European organizations should: 1) Monitor for and promptly apply official security patches from Google or device manufacturers once they become available. 2) Temporarily disable or restrict key-based pairing features in Bluetooth settings where feasible, especially in high-security environments. 3) Implement strict physical security controls to limit attacker proximity to sensitive devices, including shielding or controlled access zones. 4) Employ network segmentation and device management policies to isolate vulnerable Android devices from critical networks. 5) Use endpoint detection and response (EDR) tools to monitor for unusual Bluetooth activity or pairing attempts. 6) Educate users about the risks of unauthorized Bluetooth connections and encourage disabling Bluetooth when not in use. 7) Coordinate with mobile device management (MDM) solutions to enforce security configurations and rapid patch deployment. 8) Conduct regular security audits focusing on wireless communication channels and device configurations. These measures go beyond generic advice by focusing on the specific attack vector and operational context of the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Google_Devices
Date Reserved
2025-04-16T00:33:24.577Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696929a053752d4047c61cdb

Added to database: 1/15/2026, 5:53:36 PM

Last enriched: 1/15/2026, 6:08:10 PM

Last updated: 1/15/2026, 7:18:12 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats