SB2025090536 - Multiple vulnerabilities in Google Pixel
Published: September 5, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 23 secuirty vulnerabilities.
1) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-36893)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the TPU subcomponent in Pixel. A local application can gain access to sensitive information.
2) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-36909)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the WLAN Functional patches For details on the new bug fixes and functional patches included in this release, refer to the Pixel Community forum.Common questions and answersThis section answers common questions that may occur after reading thisbulletin.1. How do I determine if my device is updated to address these issues?Security patch levels of 2025-09-05 or later address all issues associated with the 2025-09-05 security patch level and all previous patch levels. To learn how to check a device\'s security patch level, read the instructions on the Google device update schedule.2. What do the entries in the Type column mean?Entries in the Type column of the vulnerability details table reference the classification of the security vulnerability. subcomponent in Pixel. A local application can gain access to sensitive information.
3) Improper input validation (CVE-ID: CVE-2025-36908)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the WLAN subcomponent in Pixel. A local application can execute arbitrary code.
4) Improper input validation (CVE-ID: CVE-2025-36903)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the lwis subcomponent in Pixel. A local application can execute arbitrary code.
5) Improper input validation (CVE-ID: CVE-2025-36902)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Synaptics TouchCom driver subcomponent in Pixel. A local application can execute arbitrary code.
6) Improper input validation (CVE-ID: CVE-2025-36901)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the WLAN subcomponent in Pixel. A local application can execute arbitrary code.
7) Improper input validation (CVE-ID: CVE-2025-36900)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the lwis subcomponent in Pixel. A local application can execute arbitrary code.
8) Improper input validation (CVE-ID: CVE-2025-36894)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Modem subcomponent in Pixel. A local application can perform a denial of service (DoS) attack.
9) Improper input validation (CVE-ID: CVE-2025-36892)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the WLAN subcomponent in Pixel. A local application can perform a denial of service (DoS) attack.
10) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-36895)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the WLAN subcomponent in Pixel. A local application can gain access to sensitive information.
11) Improper input validation (CVE-ID: CVE-2025-36907)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Pixel Boot Loader subcomponent in Pixel. A local application can execute arbitrary code.
12) Improper input validation (CVE-ID: CVE-2025-36897)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the Cellular Modem subcomponent in Pixel. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.
13) Improper input validation (CVE-ID: CVE-2025-36906)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the NeuralNetworks subcomponent in Pixel. A local application can execute arbitrary code.
14) Improper input validation (CVE-ID: CVE-2025-36905)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the GXP subcomponent in Pixel. A local application can execute arbitrary code.
15) Improper input validation (CVE-ID: CVE-2025-36904)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the WLAN subcomponent in Pixel. A local application can execute arbitrary code.
16) Improper input validation (CVE-ID: CVE-2025-36899)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Secure Element subcomponent in Pixel. A local application can execute arbitrary code.
17) Improper input validation (CVE-ID: CVE-2025-36898)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Pixel Sim Lock subcomponent in Pixel. A local application can execute arbitrary code.
18) Improper input validation (CVE-ID: CVE-2025-36896)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the WLAN subcomponent in Pixel. A local application can execute arbitrary code.
19) Improper input validation (CVE-ID: CVE-2025-36891)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the WLAN subcomponent in Pixel. A local application can execute arbitrary code.
20) Improper input validation (CVE-ID: CVE-2025-36890)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the WLAN subcomponent in Pixel. A local application can execute arbitrary code.
21) Improper input validation (CVE-ID: CVE-2025-32344)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the RIL subcomponent in Pixel. A local application can execute arbitrary code.
22) Improper input validation (CVE-ID: CVE-2025-32343)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the TPU subcomponent in Pixel. A local application can execute arbitrary code.
23) Improper input validation (CVE-ID: CVE-2025-32342)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the TPU subcomponent in Pixel. A local application can execute arbitrary code.
Remediation
Install update from vendor's website.