Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36925: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-36925cvecve-2025-36925
Published: Thu Dec 11 2025 (12/11/2025, 19:35:40 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

CVE-2025-36925 is a high-severity elevation of privilege vulnerability in the Android kernel, specifically in the WAVES_send_data_to_dsp function of libaoc_waves. c. The flaw arises from a missing bounds check, leading to a possible out-of-bounds write. Exploitation requires only local access with limited privileges and no user interaction. Successful exploitation can result in full compromise of confidentiality, integrity, and availability of the affected device. No known exploits are currently reported in the wild. The vulnerability affects Android kernel versions and is tagged under CWE-787 (out-of-bounds write).

AI-Powered Analysis

AILast updated: 12/19/2025, 05:43:20 UTC

Technical Analysis

CVE-2025-36925 is a vulnerability identified in the Android kernel component, specifically within the WAVES_send_data_to_dsp function of the libaoc_waves.c source file. The root cause is a missing bounds check that allows an out-of-bounds write operation. This type of memory corruption can enable an attacker with local access and limited privileges to escalate their privileges to a higher level, potentially gaining kernel-level execution rights. The vulnerability does not require any user interaction, which increases its risk profile. The CVSS v3.1 base score is 7.8, reflecting high severity due to the combination of local attack vector, low attack complexity, required privileges, and the impact on confidentiality, integrity, and availability (all rated high). Although no public exploits have been reported yet, the nature of the vulnerability (CWE-787) suggests that exploitation could lead to complete system compromise, including unauthorized access to sensitive data, modification of system files, or denial of service. The vulnerability affects the Android kernel, which is widely deployed across numerous devices globally, including smartphones, tablets, and embedded systems. The absence of a patch link indicates that a fix may not yet be publicly available, increasing the urgency for affected parties to monitor updates closely.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those relying heavily on Android devices for business operations, including mobile workforce management, secure communications, and IoT deployments. Successful exploitation could allow attackers to bypass security controls, access sensitive corporate data, or disrupt critical services. Given the high impact on confidentiality, integrity, and availability, organizations could face data breaches, operational downtime, and reputational damage. The local attack vector means that physical access or prior compromise of a lower-privileged account is necessary, which somewhat limits remote exploitation but does not eliminate risk, especially in environments where devices are shared or less physically secure. The lack of required user interaction further increases the threat as exploitation can occur silently. Additionally, the widespread use of Android in consumer and enterprise environments across Europe means that the potential attack surface is large. This vulnerability could also be leveraged in targeted attacks against high-value individuals or organizations, including government agencies and critical infrastructure operators.

Mitigation Recommendations

Organizations should prioritize the following mitigations: 1) Monitor official Google and Android security advisories for patches addressing CVE-2025-36925 and apply updates promptly once available. 2) Implement strict device management policies to limit local access to Android devices, including enforcing strong authentication and physical security controls. 3) Employ mobile device management (MDM) solutions to enforce security configurations and restrict installation of untrusted applications that could facilitate local privilege escalation. 4) Conduct regular security audits and endpoint monitoring to detect unusual behavior indicative of exploitation attempts. 5) Educate users about the risks of granting unnecessary permissions or physical access to devices. 6) For high-security environments, consider isolating critical Android devices or using hardened kernel versions where feasible. 7) Evaluate the use of runtime protections such as kernel address space layout randomization (KASLR) and memory protection mechanisms to reduce exploitation success. 8) Prepare incident response plans specifically addressing local privilege escalation scenarios on mobile devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Google_Devices
Date Reserved
2025-04-16T00:33:34.962Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b21657d4c6f31f7c3532b

Added to database: 12/11/2025, 7:54:13 PM

Last enriched: 12/19/2025, 5:43:20 AM

Last updated: 2/5/2026, 9:54:00 PM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats