CVE-2025-36907

Android · Android OS

**A high-severity vulnerability in a core Android drawing library could be exploited by a malicious application or crafted data to cause a denial of service or potentially execute arbitrary code.**.

Executive summary

A high-severity vulnerability in a core Android drawing library could be exploited by a malicious application or crafted data to cause a denial of service or potentially execute arbitrary code.

Vulnerability

A flaw exists in the draw_surface_image() function within Android's drawing library (abl/android/lib/draw/draw). This type of vulnerability in a low-level graphics function often relates to improper handling of malformed image data, leading to a buffer overflow or other memory corruption issues.

Business impact

With a CVSS score of 7.3 (High), this vulnerability could significantly impact the stability and security of affected Android devices. An attacker could trigger this flaw by tricking a user into opening a malicious image file or visiting a webpage with crafted content, leading to an application crash or a persistent device reboot (denial of service). In a worst-case scenario, memory corruption could be leveraged for arbitrary code execution.

Remediation

Immediate Action: Apply the Android security updates provided by the device manufacturer or carrier as soon as they become available. Encourage users to enable automatic updates.

Proactive Monitoring: Monitor devices for unexpected crashes or reboots, especially when rendering image content. Utilize mobile device management (MDM) and mobile threat defense (MTD) solutions to detect malicious applications.

Compensating Controls: Advise users to avoid opening attachments or clicking links from untrusted sources. Install applications only from the official Google Play Store to reduce the risk of installing a malicious app that could exploit this flaw.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability poses a serious risk to the stability and security of Android devices. IT administrators managing mobile device fleets must ensure that security patches are deployed promptly. The potential for denial of service or code execution warrants immediate attention to mitigate the threat to device integrity and user data.