Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36934: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-36934cvecve-2025-36934
Published: Thu Dec 11 2025 (12/11/2025, 19:35:47 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In bigo_worker_thread of private/google-modules/video/gchips/bigo.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 01/16/2026, 09:31:15 UTC

Technical Analysis

CVE-2025-36934 is a vulnerability identified in the Android kernel, specifically within the bigo_worker_thread function located in private/google-modules/video/gchips/bigo.c. The root cause is a use-after-free condition triggered by a race condition, which allows an attacker to exploit memory corruption. This flaw enables local attackers to escalate privileges without requiring any prior execution privileges or user interaction, making it a potent threat for local compromise scenarios. The vulnerability is categorized under CWE-362 (Race Condition) and CWE-416 (Use After Free), indicating that improper synchronization and memory management lead to this security issue. The CVSS v3.1 base score is 7.4, reflecting high severity with a vector of AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires local access and high attack complexity but no privileges or user interaction, and it impacts confidentiality, integrity, and availability severely. While no known exploits are currently in the wild, the potential for exploitation is significant due to the lack of required privileges and user interaction. The vulnerability affects the Android kernel, which is widely deployed across numerous devices globally, including many used in European enterprises and consumers. The absence of available patches at the time of publication necessitates immediate attention to monitoring vendor updates and preparing mitigation strategies.

Potential Impact

For European organizations, the impact of CVE-2025-36934 is substantial. Since the vulnerability allows local privilege escalation on Android devices, attackers who gain physical or local access to devices can elevate their privileges to kernel level, potentially bypassing security controls and gaining full control over the device. This can lead to unauthorized access to sensitive corporate data, interception or manipulation of communications, installation of persistent malware, and lateral movement within enterprise networks. The compromise of mobile devices used by employees, especially those with access to corporate resources, can undermine organizational security posture. Given the widespread use of Android devices in Europe for both personal and professional purposes, the risk extends to sectors such as finance, government, healthcare, and critical infrastructure. The high confidentiality, integrity, and availability impact means that data breaches, service disruptions, and reputational damage are plausible consequences if the vulnerability is exploited.

Mitigation Recommendations

1. Monitor official Google and Android security advisories closely for patches addressing CVE-2025-36934 and apply them promptly once available. 2. Implement strict device usage policies limiting physical and local access to Android devices, especially those used for sensitive operations. 3. Employ mobile device management (MDM) solutions to enforce security configurations, restrict installation of untrusted applications, and enable remote wipe capabilities. 4. Educate users about the risks of local device compromise and encourage secure handling of devices, including locking screens and avoiding untrusted environments. 5. Where possible, restrict or disable unnecessary kernel modules or features related to the vulnerable component to reduce the attack surface. 6. Conduct regular security audits and penetration testing on mobile device fleets to detect potential exploitation attempts. 7. Consider network segmentation and zero-trust principles to limit the impact of compromised devices on broader enterprise networks. 8. Maintain comprehensive logging and monitoring on mobile endpoints to detect anomalous behaviors indicative of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Google_Devices
Date Reserved
2025-04-16T00:33:45.254Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b21667d4c6f31f7c3536f

Added to database: 12/11/2025, 7:54:14 PM

Last enriched: 1/16/2026, 9:31:15 AM

Last updated: 2/6/2026, 12:37:09 AM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats