CVE-2025-36917
📋 TL;DR
This vulnerability in SwDcpItg of up_L2commonPdcpSecurity.cpp allows remote attackers to cause denial of service through an incorrect bounds check. It affects Android Pixel devices and potentially other Android implementations using this component. No user interaction is required for exploitation.
💻 Affected Systems
- Google Pixel devices
- Android implementations using SwDcpItg component
📦 What is this software?
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
Complete system crash or service disruption on affected devices, potentially affecting multiple devices in a network if exploited at scale.
Likely Case
Individual device instability or temporary service interruption requiring reboot to restore functionality.
If Mitigated
Minimal impact with proper network segmentation and updated devices.
🎯 Exploit Status
Remote exploitation without authentication makes this particularly dangerous in exposed environments
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: December 2025 Android security patch
Vendor Advisory: https://source.android.com/security/bulletin/pixel/2025-12-01
Restart Required: Yes
Instructions:
1. Check for system updates in Settings > System > System update. 2. Install December 2025 security patch. 3. Reboot device after installation.
🔧 Temporary Workarounds
Network segmentation
allIsolate affected devices from untrusted networks
Disable cellular data
androidTemporarily disable cellular connectivity to prevent remote exploitation
🧯 If You Can't Patch
- Isolate affected devices in separate network segments
- Implement strict network access controls and monitor for abnormal traffic patterns
🔍 How to Verify
Check if Vulnerable:
Check Android security patch level in Settings > About phone > Android version > Build number
Check Version:
adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify security patch level shows 'December 1, 2025' or later
📡 Detection & Monitoring
Log Indicators:
- Kernel panics
- PDCP layer errors
- Unexpected process terminations in cellular stack
Network Indicators:
- Abnormal cellular protocol traffic
- Unexpected connection resets
SIEM Query:
source="android_logs" AND ("PDCP" OR "SwDcpItg") AND ("crash" OR "panic" OR "error")