PT-2025-42572 · Samsung +3 · Samsung +3
Published
2025-10-14
·
Updated
2025-10-21
·
CVE-2025-54957
CVSS v3.1
6.5
6.5
Medium
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
Dolby UDC and Affected Versions
Dolby UDC versions 4.5 through 4.13
Description
An issue exists in the Dolby UDC DD+ decoder where processing a malformed DD+ bitstream can lead to a crash. Specifically, an integer overflow during length calculation when processing Evolution data within the
evo priv.c
component can result in an out-of-bounds write. This allows attackers to potentially overwrite data structures, including pointers, leading to remote code execution. The vulnerability is particularly critical on Android devices, where it can be exploited without user interaction through crafted audio messages. The issue affects the system by allowing remote attackers to execute arbitrary code. It is estimated that a significant number of devices worldwide could be affected. Researchers demonstrated the ability to achieve zero-click code execution on devices like the Pixel 9 and Samsung S24. The vulnerability is triggered by processing malicious audio files, causing memory corruption and crashes. The decoder writes data into a buffer, and the integer overflow leads to an undersized buffer and ineffective bounds checking.Recommendations
Update Dolby UDC to a newer version that contains a fix for this vulnerability.
Fix
RCE
Memory Corruption
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2025-54957
Affected Products
Android
Pixel
Samsung
Windows
References · 15
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-54957 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54957 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-54957 · Security Note
- https://t.me/true_secator/7549 · Telegram Post
- https://twitter.com/The_Hunt_x/status/1979126296446894128 · Twitter Post
- https://twitter.com/BugBountyShorts/status/1980303321568018526 · Twitter Post
- https://twitter.com/CVEnew/status/1980291976873312497 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1obj23n/critical_vulnerability_in_dolby_decoder_enables · Reddit Post
- https://professional.dolby.com/siteassets/pdfs/dolby-security-advisory-CVE-2025-54957-Oct-14-25.pdf · Note
- https://t.me/cveNotify/139411 · Telegram Post
- https://reddit.com/r/pwnhub/comments/1obj48t/highseverity_dolby_decoder_flaw_opens_door_to · Reddit Post
- https://twitter.com/cyberkendra/status/1978939223399973049 · Twitter Post
- https://t.me/CVEtracker/35303 · Telegram Post
- https://twitter.com/androidmalware2/status/1979124477356032210 · Twitter Post
- https://twitter.com/zeeshankghouri/status/1980121542374601088 · Twitter Post