Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-25847 | In bnepu_check_send_packet of bnep_utils.cc, there is a possible way to achieve code execution due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
Tue, 02 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:* |
Wed, 27 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-416 | |
| Metrics |
cvssV3_1
|
Wed, 27 Aug 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android |
|
| Vendors & Products |
Google
Google android |
Tue, 26 Aug 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In bnepu_check_send_packet of bnep_utils.cc, there is a possible way to achieve code execution due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | |
| References |
|
Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2025-08-27T14:04:40.863Z
Reserved: 2025-01-06T17:44:38.874Z
Link: CVE-2025-22406
Updated: 2025-08-27T13:35:36.578Z
Status : Analyzed
Published: 2025-08-26T23:15:33.940
Modified: 2025-09-02T18:01:27.570
Link: CVE-2025-22406
No data.
OpenCVE Enrichment
Updated: 2025-08-27T11:21:17Z
EUVD