CVE-2025-57840
Privilege Bypass in Android Debug Bridge Affecting Service Availability
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: Honor Device Co., Ltd.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| android_debug_bridge | * | |
| honor | magic_os | 10.0.0.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a privilege bypass issue in Android Debug Bridge (ADB) that allows an attacker to bypass privilege restrictions. Exploiting this vulnerability may affect the availability of services on the affected device. [1]
How can this vulnerability impact me? :
The vulnerability can impact you by potentially affecting the availability of services on your device, meaning certain services may become unavailable or disrupted due to unauthorized privilege bypass. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your device to MagicOS version 10.0.0.1 or later where the issue has been resolved. Devices with automatic updates enabled will receive a system update prompt to install the fix. Applying this update is the recommended immediate step to protect against the privilege bypass vulnerability in ADB. [1]