CVE-2025-36930
BaseFortify
Publication date: 2025-12-11
Last updated on: 2025-12-12
Assigner: Google Devices
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| android | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out of bounds write in the GetHostAddress function of gxp_buffer.h caused by a missing bounds check. It can be exploited locally to escalate privileges without needing additional execution privileges or user interaction.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update your Google Pixel devices to the latest security patch level, specifically the December 5, 2025 patch or later, which includes fixes for related security issues. Applying the latest firmware updates from the Google Developer site is recommended. [1]
How can this vulnerability impact me? :
The vulnerability can allow a local attacker to escalate their privileges on the affected system, potentially gaining higher access rights than intended, which could lead to unauthorized actions or access.