CVE-2025-36911

HIGH7.1/ 10.0
Share:
Published: January 15, 2026 at 06:16 PM
Modified: January 28, 2026 at 05:16 AM
Source: dsap-vuln-management@google.com

Vulnerability Description

In key-based pairing, there is a possible ID due to a logic error in the code. This could lead to remote (proximal/adjacent) information disclosure of user's conversations and location with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS Metrics

Base Score
7.1
Severity
HIGH
Vector String
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Weaknesses (CWE)

NVD-CWE-noinfo
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

A critical vulnerability exists in key-based pairing, enabling remote information disclosure of user conversations and location. This flaw, requiring no user interaction, allows attackers to eavesdrop on sensitive communications and track user movements, posing a significant privacy and security risk.

02 // Vulnerability Mechanism

Step 1: Target Identification: The attacker identifies a target user or device utilizing key-based pairing.

Step 2: Malicious Request Crafting: The attacker crafts a specially designed pairing request. This request contains a manipulated or crafted identifier.

Step 3: Pairing Initiation: The attacker initiates the pairing process with the target device, sending the malicious pairing request.

Step 4: Logic Flaw Trigger: The target device processes the malicious request, triggering the logic error within the key-based pairing implementation.

Step 5: Information Disclosure: Due to the logic error, the target device inadvertently discloses the target user's conversations and location data to the attacker.

03 // Deep Technical Analysis

The vulnerability stems from a logic error within the key-based pairing implementation. Specifically, the code fails to properly validate or sanitize identifiers during the pairing process. This allows an attacker to craft a malicious pairing request containing a crafted identifier. This crafted identifier exploits a flaw in how the system handles paired devices, leading to the disclosure of sensitive data associated with the targeted user's conversations and location. The root cause is likely an improper check or lack of a check on the identifier before it is used to access or retrieve user data. This could involve a memory leak or an unauthorized access scenario.

CVE-2025-36911 - HIGH Severity (7.1) | Free CVE Database | 4nuxd