Skip to main content

CVE-2025-0082: Information disclosure in Google Android

Medium
VulnerabilityCVE-2025-0082cvecve-2025-0082
Published: Tue Aug 26 2025 (08/26/2025, 22:48:41 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In multiple functions of StatusHint.java and TelecomServiceImpl.java, there is a possible way to reveal images across users due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.

AI-Powered Analysis

AILast updated: 09/03/2025, 01:05:34 UTC

Technical Analysis

CVE-2025-0082 is a medium-severity information disclosure vulnerability affecting multiple versions of the Google Android operating system, specifically versions 12, 12L, 13, 14, and 15. The vulnerability arises from a confused deputy problem within multiple functions of the StatusHint.java and TelecomServiceImpl.java components. A confused deputy occurs when a privileged component is tricked into misusing its authority, in this case allowing unauthorized access to images across different user profiles on the same device. Exploitation requires local access with limited privileges (PR:L) and user interaction, but does not require elevated execution privileges. The vulnerability can lead to unauthorized disclosure of sensitive images stored on the device, impacting confidentiality. The CVSS 3.1 base score is 5.5, reflecting a medium severity level, with an attack vector of local access, low attack complexity, and no user interface required for the attack once local access is obtained. The vulnerability does not affect integrity or availability, only confidentiality. No known exploits are currently reported in the wild, and no patches have been linked yet. The CWE classification is CWE-610, which relates to improper control of a resource through a confused deputy problem. This vulnerability highlights the risks of multi-user environments on Android devices where user isolation mechanisms can be bypassed due to flawed permission handling in system services related to telephony and status hints.

Potential Impact

For European organizations, the primary impact of CVE-2025-0082 is the potential unauthorized disclosure of sensitive images stored on Android devices used within the organization. This could include corporate-owned devices or employee personal devices used for work (BYOD). The confidentiality breach could expose sensitive personal or corporate information, potentially violating GDPR requirements for data protection and privacy. Although the attack requires local access and user interaction, insider threats or social engineering could facilitate exploitation. The vulnerability could be particularly impactful in sectors handling sensitive personal data such as healthcare, finance, and government agencies. Since Android is widely used across Europe, the risk is significant for organizations relying on Android devices for communication and data storage. The lack of known exploits in the wild suggests a window of opportunity for proactive mitigation before widespread exploitation occurs. However, the medium severity indicates that while the impact is serious, it is not critical or likely to cause immediate operational disruption.

Mitigation Recommendations

To mitigate CVE-2025-0082, European organizations should: 1) Ensure all Android devices are updated promptly once official patches are released by Google, as no patches are currently linked. 2) Enforce strict device access controls to prevent unauthorized local access, including strong lock screen policies and biometric authentication. 3) Educate users about the risks of social engineering and the importance of not interacting with suspicious prompts that could trigger the vulnerability. 4) Limit the use of multi-user profiles on Android devices where possible, as the vulnerability exploits cross-user image disclosure. 5) Employ mobile device management (MDM) solutions to monitor and control app permissions and system service interactions. 6) Regularly audit devices for unusual access patterns or attempts to access images across user boundaries. 7) Consider restricting the use of affected Android versions in high-risk environments until patches are available. These steps go beyond generic advice by focusing on user interaction prevention, multi-user profile management, and device access controls specific to this vulnerability’s exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2024-12-13T16:56:02.698Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ae3d1bad5a09ad005c3bd0

Added to database: 8/26/2025, 11:02:51 PM

Last enriched: 9/3/2025, 1:05:34 AM

Last updated: 9/4/2025, 11:06:15 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats