CVE-2025-26441

6.5 MEDIUM

📋 TL;DR

This CVE describes an out-of-bounds read vulnerability in Android's Bluetooth SDP discovery component that could allow remote attackers to read sensitive memory contents without authentication or user interaction. It affects Android devices with vulnerable Bluetooth implementations, potentially exposing device information to nearby attackers.

💻 Affected Systems

Products:
  • Android
Versions: Android versions prior to June 2025 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Bluetooth to be enabled and discoverable; affects devices with the vulnerable Bluetooth stack implementation

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker could read sensitive memory contents including cryptographic keys, authentication tokens, or other device secrets, leading to complete device compromise.

🟠

Likely Case

Information disclosure of limited memory contents, potentially revealing device identifiers, Bluetooth pairing information, or other system data.

🟢

If Mitigated

Limited impact with proper network segmentation and Bluetooth access controls, potentially only exposing non-sensitive system information.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires proximity to target device and knowledge of Bluetooth protocol; no authentication needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: June 2025 Android Security Patch or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-06-01

Restart Required: No

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Apply June 2025 security patch or later. 3. Verify patch installation in Settings > About phone > Android security patch level.

🔧 Temporary Workarounds

Disable Bluetooth when not in use

Android

Turn off Bluetooth to prevent remote exploitation via this vulnerability

adb shell settings put global bluetooth_on 0
Settings > Connected devices > Connection preferences > Bluetooth > Turn off

Set Bluetooth to non-discoverable mode

Android

Configure Bluetooth to be non-discoverable to reduce attack surface

adb shell settings put global bluetooth_discoverability 0
Settings > Connected devices > Connection preferences > Bluetooth > Device name > Turn off visibility

🧯 If You Can't Patch

  • Implement network segmentation to isolate Bluetooth traffic
  • Deploy Bluetooth security monitoring and anomaly detection

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android security patch level. If date is before June 2025, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows June 2025 or later date in Settings > About phone > Android security patch level.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Bluetooth SDP discovery requests
  • Multiple failed Bluetooth connection attempts from unknown devices

Network Indicators:

  • Abnormal Bluetooth traffic patterns
  • SDP discovery requests from unexpected MAC addresses

SIEM Query:

source="android_logs" AND (event="bluetooth_sdp_discovery" OR event="bluetooth_connection_attempt") AND result="failed"

🔗 References

📤 Share & Export