CVE-2025-36929
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-11

Last updated on: 2025-12-12

Assigner: Google Devices

Description
In AreFencesRegistered of gxp_fence_manager.cc, there is a possible information leak due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-11
Last Modified
2025-12-12
Generated
2026-05-07
AI Q&A
2025-12-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
google android *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

Apply the latest security patches or firmware updates that address this vulnerability as soon as they become available. Since this vulnerability involves local information disclosure with no user interaction needed, updating to the latest security patch level is the recommended mitigation step.


What immediate steps should I take to mitigate this vulnerability?

Since the vulnerability involves local information disclosure with no additional execution privileges needed and no user interaction required, the immediate mitigation step is to apply any available security patches or updates that address this issue. However, no specific patch or update information is provided in the resources for CVE-2025-36929.


Can you explain this vulnerability to me?

This vulnerability occurs in the AreFencesRegistered function of gxp_fence_manager.cc, where improper input validation can cause an information leak. This means that sensitive local information could be disclosed without needing any additional execution privileges or user interaction.


How can this vulnerability impact me? :

The vulnerability can lead to local information disclosure, potentially exposing sensitive data on the affected system. Since no additional privileges or user interaction are required, an attacker with local access could exploit this to gain unauthorized access to information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart