CVE-2025-36929
BaseFortify
Publication date: 2025-12-11
Last updated on: 2025-12-12
Assigner: Google Devices
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| android | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
Apply the latest security patches or firmware updates that address this vulnerability as soon as they become available. Since this vulnerability involves local information disclosure with no user interaction needed, updating to the latest security patch level is the recommended mitigation step.
What immediate steps should I take to mitigate this vulnerability?
Since the vulnerability involves local information disclosure with no additional execution privileges needed and no user interaction required, the immediate mitigation step is to apply any available security patches or updates that address this issue. However, no specific patch or update information is provided in the resources for CVE-2025-36929.
Can you explain this vulnerability to me?
This vulnerability occurs in the AreFencesRegistered function of gxp_fence_manager.cc, where improper input validation can cause an information leak. This means that sensitive local information could be disclosed without needing any additional execution privileges or user interaction.
How can this vulnerability impact me? :
The vulnerability can lead to local information disclosure, potentially exposing sensitive data on the affected system. Since no additional privileges or user interaction are required, an attacker with local access could exploit this to gain unauthorized access to information.