CVE-2025-36896

9.8 CRITICAL

📋 TL;DR

This vulnerability in the WLAN subsystem of Android on Google Pixel devices allows local attackers to gain elevated privileges on the device. It affects Google Pixel devices running Android versions before the September 2025 security patch. Attackers could potentially execute arbitrary code with system-level permissions.

💻 Affected Systems

Products:
  • Google Pixel devices
Versions: Android versions before 2025-09-05 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Google Pixel devices; other Android devices may not be vulnerable. Requires WLAN functionality to be present.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install persistent malware, access all user data, intercept communications, and maintain persistent control over the device.

🟠

Likely Case

Local privilege escalation allowing malicious apps to break out of sandbox and access sensitive system resources, user data, or other apps' data.

🟢

If Mitigated

Limited impact if devices are fully patched and have proper app sandboxing and security controls enabled.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring physical access or malicious app installation.
🏢 Internal Only: HIGH - Malicious apps or users with physical access could exploit this to gain elevated privileges on affected devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to device or ability to install malicious app. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level 2025-09-05 or later

Vendor Advisory: https://source.android.com/security/bulletin/pixel/2025-09-01

Restart Required: Yes

Instructions:

1. Go to Settings > System > System update on Pixel device. 2. Check for and install available updates. 3. Ensure device shows 'Security patch level: September 5, 2025' or later in Settings > About phone > Android version.

🔧 Temporary Workarounds

Disable WLAN

android

Temporarily disable wireless networking to prevent exploitation via WLAN subsystem

adb shell svc wifi disable
Settings > Network & internet > Wi-Fi > Turn off

Restrict app installations

android

Only install apps from trusted sources like Google Play Store

Settings > Security > Install unknown apps > Disable for all apps

🧯 If You Can't Patch

  • Isolate affected devices from sensitive networks and data
  • Implement strict app installation policies and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check Settings > About phone > Android version > Security patch level. If date is before September 5, 2025, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Security patch level shows 'September 5, 2025' or later date after applying update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual WLAN driver activity
  • Privilege escalation attempts in system logs
  • Suspicious app behavior attempting to access WLAN subsystem

Network Indicators:

  • Unusual WLAN traffic patterns from Pixel devices
  • Suspicious network activity from elevated processes

SIEM Query:

source="android_system" AND (event_type="privilege_escalation" OR process_name="wlan*" AND severity="high")

🔗 References

📤 Share & Export