CVE-2025-0087: Elevation of privilege in Google Android
In onCreate of UninstallerActivity.java, there is a possible way to uninstall a different user's app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
AI Analysis
Technical Summary
CVE-2025-0087 is a local elevation of privilege vulnerability affecting Google Android versions 13, 14, and 15. The flaw exists in the onCreate method of the UninstallerActivity.java component, where a missing permission check allows an attacker to uninstall applications belonging to other users on the same device. This vulnerability arises because the UninstallerActivity does not properly verify that the uninstall request is authorized for the targeted app, enabling a malicious local user or process to remove apps they should not have control over. Exploitation does not require any additional execution privileges beyond local access, nor does it require user interaction, making it a stealthy and potentially impactful vulnerability. Although no known exploits are currently reported in the wild, the vulnerability's nature suggests that an attacker with local access could leverage it to disrupt other users' environments or remove security-critical applications, potentially weakening device security or causing denial of service. The absence of a CVSS score means the severity must be assessed based on the impact on confidentiality, integrity, and availability, as well as ease of exploitation and scope of affected systems.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in environments where Android devices are shared among multiple users or used in enterprise contexts with multi-user profiles. The ability to uninstall other users' apps without permission could lead to disruption of business-critical applications, loss of security controls, or removal of monitoring tools, thereby degrading device integrity and availability. Confidentiality impact is limited since the vulnerability does not directly expose data, but the integrity and availability of applications and services on affected devices are at risk. In sectors such as healthcare, finance, and government where Android devices may be used for sensitive operations, this could lead to operational disruptions or compliance violations. The lack of required user interaction and no need for elevated privileges beyond local access means that insider threats or malware with local execution capabilities could exploit this vulnerability with relative ease.
Mitigation Recommendations
To mitigate CVE-2025-0087, organizations should prioritize updating affected Android devices to patched versions once Google releases security updates addressing this issue. Until patches are available, organizations should enforce strict device access controls to limit local user privileges and prevent unauthorized users from gaining local access. Employ mobile device management (MDM) solutions to monitor and restrict app installations and uninstallations, and consider disabling multi-user profiles if not required. Additionally, audit device logs regularly to detect unusual uninstall activities. For high-security environments, consider deploying endpoint protection solutions that can detect and block unauthorized app removal attempts. Finally, educate users about the risks of local device access and enforce policies that restrict physical and logical access to corporate Android devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Finland
CVE-2025-0087: Elevation of privilege in Google Android
Description
In onCreate of UninstallerActivity.java, there is a possible way to uninstall a different user's app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2025-0087 is a local elevation of privilege vulnerability affecting Google Android versions 13, 14, and 15. The flaw exists in the onCreate method of the UninstallerActivity.java component, where a missing permission check allows an attacker to uninstall applications belonging to other users on the same device. This vulnerability arises because the UninstallerActivity does not properly verify that the uninstall request is authorized for the targeted app, enabling a malicious local user or process to remove apps they should not have control over. Exploitation does not require any additional execution privileges beyond local access, nor does it require user interaction, making it a stealthy and potentially impactful vulnerability. Although no known exploits are currently reported in the wild, the vulnerability's nature suggests that an attacker with local access could leverage it to disrupt other users' environments or remove security-critical applications, potentially weakening device security or causing denial of service. The absence of a CVSS score means the severity must be assessed based on the impact on confidentiality, integrity, and availability, as well as ease of exploitation and scope of affected systems.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in environments where Android devices are shared among multiple users or used in enterprise contexts with multi-user profiles. The ability to uninstall other users' apps without permission could lead to disruption of business-critical applications, loss of security controls, or removal of monitoring tools, thereby degrading device integrity and availability. Confidentiality impact is limited since the vulnerability does not directly expose data, but the integrity and availability of applications and services on affected devices are at risk. In sectors such as healthcare, finance, and government where Android devices may be used for sensitive operations, this could lead to operational disruptions or compliance violations. The lack of required user interaction and no need for elevated privileges beyond local access means that insider threats or malware with local execution capabilities could exploit this vulnerability with relative ease.
Mitigation Recommendations
To mitigate CVE-2025-0087, organizations should prioritize updating affected Android devices to patched versions once Google releases security updates addressing this issue. Until patches are available, organizations should enforce strict device access controls to limit local user privileges and prevent unauthorized users from gaining local access. Employ mobile device management (MDM) solutions to monitor and restrict app installations and uninstallations, and consider disabling multi-user profiles if not required. Additionally, audit device logs regularly to detect unusual uninstall activities. For high-security environments, consider deploying endpoint protection solutions that can detect and block unauthorized app removal attempts. Finally, educate users about the risks of local device access and enforce policies that restrict physical and logical access to corporate Android devices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- google_android
- Date Reserved
- 2024-12-13T16:56:09.215Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b9d3bd88499799243bc13f
Added to database: 9/4/2025, 6:00:29 PM
Last enriched: 9/4/2025, 6:00:58 PM
Last updated: 9/5/2025, 8:04:46 PM
Views: 3
Related Threats
CVE-2025-58375
UnknownCVE-2025-58373: CWE-59: Improper Link Resolution Before File Access ('Link Following') in RooCodeInc Roo-Code
MediumCVE-2025-58371: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in RooCodeInc Roo-Code
CriticalCVE-2025-58372: CWE-732: Incorrect Permission Assignment for Critical Resource in RooCodeInc Roo-Code
HighCVE-2025-58370: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in RooCodeInc Roo-Code
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.