CVE-2025-0092

6.5 MEDIUM

📋 TL;DR

This Bluetooth vulnerability in Android allows attackers to bypass permission checks and access sensitive information when users interact with misleading UI prompts. It affects Android devices with Bluetooth enabled, requiring proximity to the target device. The flaw enables unauthorized information disclosure without elevated privileges.

💻 Affected Systems

Products:
  • Android devices with Bluetooth functionality
Versions: Android versions prior to March 2025 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All Android devices with Bluetooth enabled are vulnerable by default. User interaction required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers within Bluetooth range could intercept sensitive data like device identifiers, connection details, or paired device information when users accept misleading pairing prompts.

🟠

Likely Case

Local attackers in shared spaces (offices, public areas) could harvest device information or connection metadata from users who accept Bluetooth pairing requests.

🟢

If Mitigated

With user awareness training and Bluetooth disabled in untrusted environments, impact is limited to information gathering rather than full device compromise.

🌐 Internet-Facing: LOW - Requires physical proximity via Bluetooth, not internet connectivity.
🏢 Internal Only: MEDIUM - Internal attackers within Bluetooth range could exploit this in shared office spaces or public areas.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to be within Bluetooth range and user to interact with misleading UI prompt. No authentication bypass needed beyond user interaction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: March 2025 Android Security Patch or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-03-01

Restart Required: No

Instructions:

1. Check for system updates in Settings > System > System update. 2. Install March 2025 Android Security Patch. 3. Verify patch installation in Settings > About phone > Android version.

🔧 Temporary Workarounds

Disable Bluetooth when not in use

all

Turn off Bluetooth to prevent attackers from initiating connection attempts

Settings > Connected devices > Connection preferences > Bluetooth > Toggle off

Reject unknown Bluetooth pairing requests

all

Only accept Bluetooth connections from known, trusted devices

🧯 If You Can't Patch

  • Disable Bluetooth completely in device settings
  • Implement physical security controls to limit Bluetooth range exposure in sensitive areas

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version. If patch level is earlier than March 2025, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Confirm Android security patch level shows 'March 1, 2025' or later in Settings > About phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Bluetooth pairing attempts from unknown devices
  • Multiple failed Bluetooth connection attempts

Network Indicators:

  • Unusual Bluetooth MAC addresses attempting connections
  • Bluetooth pairing requests from unexpected sources

SIEM Query:

source="android_logs" AND (event="bluetooth_pairing_attempt" AND result="success" AND device_name NOT IN ["known_devices"])

🔗 References

📤 Share & Export