Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0087: Elevation of privilege in Google Android

0
Medium
VulnerabilityCVE-2025-0087cvecve-2025-0087
Published: Thu Sep 04 2025 (09/04/2025, 17:11:42 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In onCreate of UninstallerActivity.java, there is a possible way to uninstall a different user's app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/11/2025, 20:36:29 UTC

Technical Analysis

CVE-2025-0087 is a medium-severity local privilege escalation vulnerability affecting Google Android versions 13, 14, and 15. The flaw exists in the onCreate method of the UninstallerActivity.java component, where a missing permission check allows an unprivileged local user to uninstall applications belonging to other users on the same device. This vulnerability arises from improper access control, specifically CWE-689 (Control Flow Manipulation). Exploitation does not require any additional execution privileges or user interaction, making it possible for a local attacker or malicious app to escalate privileges silently. The vulnerability impacts confidentiality slightly by enabling unauthorized removal of apps, and availability by potentially disrupting app functionality through uninstallation. The CVSS 3.1 base score is 5.1 (medium), reflecting the local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), no integrity impact (I:N), and low availability impact (A:L). No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability highlights the importance of strict permission checks in multi-user Android environments to prevent unauthorized app management actions.

Potential Impact

For European organizations, this vulnerability could pose risks primarily on shared or multi-user Android devices, such as those used in enterprise mobility, kiosks, or shared work environments. Unauthorized uninstallation of critical business or security apps could lead to operational disruptions, loss of security controls, or exposure to further attacks if protective apps are removed. Although the confidentiality impact is limited, availability impact could affect business continuity, especially in sectors relying on mobile device management (MDM) solutions or secure app ecosystems. The lack of required user interaction increases the risk of stealthy exploitation by malicious insiders or compromised apps. Organizations with Bring Your Own Device (BYOD) policies or shared device usage should be particularly cautious. However, the vulnerability does not allow remote exploitation, limiting its impact to local attackers with device access.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Enforce strict device access controls to limit local user access, including strong lock screen policies and user authentication. 2) Restrict installation of untrusted or unnecessary apps that could exploit this vulnerability. 3) Monitor device logs for unusual app uninstallations or activity related to UninstallerActivity. 4) Deploy Mobile Device Management (MDM) solutions that can detect and prevent unauthorized app removals and enforce app whitelisting. 5) Educate users about the risks of installing apps from unknown sources and the importance of device security hygiene. 6) Stay alert for official patches or updates from Google and apply them promptly once available. 7) For shared devices, consider isolating user profiles or limiting app management capabilities to trusted administrators only. These steps go beyond generic advice by focusing on controlling local access and monitoring app uninstall behaviors specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2024-12-13T16:56:09.215Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9d3bd88499799243bc13f

Added to database: 9/4/2025, 6:00:29 PM

Last enriched: 9/11/2025, 8:36:29 PM

Last updated: 10/18/2025, 8:09:59 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats