Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0080: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-0080cvecve-2025-0080
Published: Tue Aug 26 2025 (08/26/2025, 22:48:39 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In multiple locations, there is a possible way to overlay the installation confirmation dialog due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/03/2025, 01:13:39 UTC

Technical Analysis

CVE-2025-0080 is a high-severity elevation of privilege vulnerability affecting Google Android version 15. The vulnerability arises from multiple locations within the Android operating system where an attacker can perform a tapjacking or overlay attack to obscure the installation confirmation dialog. This overlay allows the attacker to trick the system into accepting an installation or permission change without the user's knowledge or consent. Notably, exploitation does not require any user interaction, which significantly increases the risk and ease of attack. The vulnerability requires local access with limited privileges (PR:L), meaning the attacker must have some level of access to the device but does not need elevated privileges initially. The attack vector is local (AV:L), and the complexity is low (AC:L), indicating that the exploit does not require sophisticated conditions or extensive knowledge. The vulnerability impacts confidentiality, integrity, and availability (all rated high), as it allows an attacker to escalate privileges and potentially gain control over the device or sensitive data. The underlying weakness is categorized under CWE-250, which relates to improper access control leading to privilege escalation. Although no known exploits are currently reported in the wild, the absence of required user interaction and the low complexity of the attack make this vulnerability a significant threat once weaponized. No patches have been linked yet, suggesting that affected organizations should monitor for updates and consider interim mitigations.

Potential Impact

For European organizations, the impact of CVE-2025-0080 could be substantial, especially for those relying heavily on Android devices for business operations, secure communications, or mobile workforce management. Successful exploitation could allow attackers to escalate privileges locally on devices, bypass security controls, and install malicious applications or malware without user awareness. This could lead to data breaches, unauthorized access to corporate networks, and disruption of services. The high confidentiality impact means sensitive corporate or personal data stored or accessed via Android devices could be exposed. Integrity and availability impacts imply that attackers could modify or disrupt device functionality, potentially affecting critical business processes. Given the increasing use of Android devices in European enterprises and government sectors, the vulnerability poses a risk to both private and public sectors. Additionally, the lack of required user interaction lowers the barrier for automated or stealthy attacks, increasing the likelihood of compromise in environments where devices are shared or less strictly controlled.

Mitigation Recommendations

1. Immediate mitigation should include restricting local access to Android devices, ensuring that only trusted users have physical or logical access. 2. Employ Mobile Device Management (MDM) solutions to enforce application installation policies and monitor for unauthorized app installations or privilege escalations. 3. Disable or restrict overlay permissions for applications where possible, as this is the vector exploited in the tapjacking attack. 4. Educate users and administrators about the risks of installing untrusted applications and the importance of device security hygiene. 5. Monitor Android security bulletins and apply official patches promptly once available. 6. Implement endpoint detection and response (EDR) tools capable of detecting suspicious privilege escalation activities on mobile devices. 7. Consider network segmentation and conditional access policies to limit the impact of compromised devices on critical systems. These steps go beyond generic advice by focusing on controlling overlay permissions, leveraging MDM capabilities, and emphasizing monitoring and user access controls specific to this vulnerability's exploitation method.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2024-12-13T16:55:59.909Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ae3d1bad5a09ad005c3bc8

Added to database: 8/26/2025, 11:02:51 PM

Last enriched: 9/3/2025, 1:13:39 AM

Last updated: 10/18/2025, 12:04:28 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats