Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36917: Denial of service in Google Android

0
Medium
VulnerabilityCVE-2025-36917cvecve-2025-36917
Published: Thu Dec 11 2025 (12/11/2025, 19:35:33 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In SwDcpItg of up_L2commonPdcpSecurity.cpp, there is a possible denial of service due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 12/11/2025, 20:15:24 UTC

Technical Analysis

CVE-2025-36917 is a vulnerability identified in the Android kernel, specifically within the function SwDcpItg of the source file up_L2commonPdcpSecurity.cpp. The root cause is an incorrect bounds check that can be exploited remotely to trigger a denial of service (DoS) condition. This vulnerability does not require any additional execution privileges or user interaction, meaning an attacker can cause the affected device to crash or become unresponsive remotely and without any user action. The Android kernel is a fundamental component responsible for managing hardware resources and system processes; thus, a DoS at this level can severely impact device availability and reliability. The vulnerability was reserved in April 2025 and published in December 2025, with no current public exploits reported. The lack of a CVSS score indicates that a formal severity assessment has not yet been provided by the vendor or CVSS maintainers. The affected product is the Android kernel, which is widely deployed across millions of devices globally, including smartphones, tablets, and embedded systems. The vulnerability's exploitation could disrupt services relying on Android devices, particularly in environments where device uptime is critical. The technical details highlight that the flaw is due to improper bounds checking, a common programming error that can lead to memory corruption or logic errors resulting in system crashes. Since no authentication or user interaction is required, the attack surface is broad, potentially allowing attackers to target devices over the network or via maliciously crafted data packets.

Potential Impact

For European organizations, the impact of CVE-2025-36917 could be significant, especially for sectors heavily reliant on Android devices such as telecommunications, public safety, healthcare, and critical infrastructure. A successful denial of service attack could lead to device crashes, loss of connectivity, and disruption of essential services. This could affect mobile workforce productivity, emergency response communications, and IoT deployments that use Android-based systems. The vulnerability could also be leveraged as part of a larger attack chain to cause widespread outages or to distract from other malicious activities. Given the kernel-level nature of the flaw, recovery may require device reboots or firmware updates, potentially causing downtime. Organizations with large Android device fleets may face operational challenges and increased support costs. Additionally, the disruption of mobile communications could have cascading effects on business continuity and safety-critical operations. The lack of user interaction and authentication requirements increases the risk of automated or large-scale exploitation attempts, which could amplify the impact across multiple organizations and sectors.

Mitigation Recommendations

To mitigate CVE-2025-36917, European organizations should prioritize the following actions: 1) Monitor vendor announcements and security advisories from Google and device manufacturers for patches or firmware updates addressing this vulnerability. 2) Deploy patches promptly once available to ensure the Android kernel is updated to a secure version. 3) Implement network-level protections such as firewalls and intrusion detection/prevention systems to detect and block suspicious traffic patterns that could exploit this vulnerability. 4) Restrict unnecessary network exposure of Android devices, especially those used in critical roles, to reduce the attack surface. 5) Employ device management solutions to maintain visibility and control over Android device configurations and update status. 6) Conduct regular security assessments and penetration tests focusing on mobile and embedded device security. 7) Educate IT and security teams about this vulnerability to ensure rapid response and incident handling. 8) Consider segmentation of critical Android-based systems to limit potential impact in case of exploitation. These measures go beyond generic advice by emphasizing proactive patch management, network defense, and operational controls tailored to the nature of this kernel-level DoS vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Google_Devices
Date Reserved
2025-04-16T00:33:34.961Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b21637d4c6f31f7c3530c

Added to database: 12/11/2025, 7:54:11 PM

Last enriched: 12/11/2025, 8:15:24 PM

Last updated: 12/12/2025, 3:07:07 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats