Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36923: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-36923cvecve-2025-36923
Published: Thu Dec 11 2025 (12/11/2025, 19:35:38 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

CVE-2025-36923 is a high-severity elevation of privilege vulnerability in the Android kernel, caused by a heap buffer overflow in the NrmmDecoder::DecodeSORTransparentContext function. This vulnerability allows an attacker in a proximal or adjacent network position to escalate privileges without requiring additional execution privileges or user interaction. Exploitation could lead to full compromise of device confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the vulnerability's nature and CVSS score of 8 indicate a significant risk. The flaw affects the Android kernel, which is widely deployed across numerous devices in Europe. Attackers could leverage this vulnerability to gain unauthorized access or control over affected devices, potentially impacting enterprise and personal data security. Mitigation requires applying patches once available and implementing network segmentation and monitoring to reduce exposure. Countries with high Android market penetration and strategic importance in technology sectors, such as Germany, France, and the UK, are most likely to be affected.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:42:52 UTC

Technical Analysis

CVE-2025-36923 is a vulnerability identified in the Android kernel, specifically within the NrmmDecoder::DecodeSORTransparentContext function located in the cn_NrmmDecoder.cpp source file. The root cause is a heap buffer overflow leading to an out-of-bounds write condition (CWE-122). This flaw allows an attacker positioned proximally or adjacently on the network to escalate privileges on the device without requiring prior elevated execution privileges or any user interaction, making it particularly dangerous. The vulnerability is triggered by malformed input that causes the decoder to write beyond allocated heap memory, potentially corrupting kernel memory structures. Successful exploitation could allow an attacker to gain kernel-level privileges, thereby compromising the device's confidentiality, integrity, and availability. The CVSS v3.1 base score is 8.0, reflecting high severity with attack vector as adjacent network (AV:A), low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The scope remains unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No patches have been linked yet, and no exploits are known in the wild, but the vulnerability's characteristics suggest it could be weaponized. Given the Android kernel's widespread deployment across mobile devices, this vulnerability poses a significant risk to users and organizations relying on Android devices.

Potential Impact

For European organizations, the impact of CVE-2025-36923 could be severe. Many enterprises rely on Android devices for communication, remote access, and mobile workflows. An attacker exploiting this vulnerability could gain kernel-level privileges, enabling them to bypass security controls, access sensitive corporate data, install persistent malware, or disrupt device operations. This could lead to data breaches, intellectual property theft, and operational downtime. The lack of required user interaction increases the risk of automated or stealthy exploitation, especially in environments where devices connect to shared or untrusted networks. Additionally, the vulnerability could be leveraged in targeted attacks against high-value individuals or organizations, including government agencies, financial institutions, and critical infrastructure operators within Europe. The potential for lateral movement within corporate networks via compromised devices further amplifies the threat.

Mitigation Recommendations

Organizations should prioritize monitoring vendor announcements and apply official patches from Google as soon as they become available. Until patches are released, network segmentation should be enforced to limit device exposure to potentially malicious adjacent network actors. Employing host-based intrusion detection systems (HIDS) and endpoint detection and response (EDR) solutions capable of monitoring kernel-level anomalies can help detect exploitation attempts. Restricting unnecessary network protocols and services on Android devices reduces the attack surface. Enterprises should also enforce strict device management policies, including disabling or limiting device features that are not essential and ensuring devices run the latest security updates. User education about connecting only to trusted networks and avoiding suspicious proximity-based connections can further reduce risk. Finally, organizations should consider implementing network access controls (NAC) to prevent compromised devices from accessing sensitive resources.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Google_Devices
Date Reserved
2025-04-16T00:33:34.962Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b21657d4c6f31f7c35325

Added to database: 12/11/2025, 7:54:13 PM

Last enriched: 12/19/2025, 5:42:52 AM

Last updated: 2/7/2026, 1:19:10 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats