Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-25860 | In main of main.cpp, there is a possible way to bypass SELinux due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
Tue, 02 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:* |
Wed, 27 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-250 | |
| Metrics |
cvssV3_1
|
Wed, 27 Aug 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android |
|
| Vendors & Products |
Google
Google android |
Tue, 26 Aug 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In main of main.cpp, there is a possible way to bypass SELinux due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | |
| References |
|
Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2025-08-27T13:52:36.086Z
Reserved: 2024-12-13T16:55:57.393Z
Link: CVE-2025-0078
Updated: 2025-08-27T13:52:32.080Z
Status : Analyzed
Published: 2025-08-26T23:15:32.337
Modified: 2025-09-02T18:08:26.323
Link: CVE-2025-0078
No data.
OpenCVE Enrichment
Updated: 2025-08-27T11:21:18Z
EUVD