Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22419: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-22419cvecve-2025-22419
Published: Tue Sep 02 2025 (09/02/2025, 22:11:11 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In multiple locations, there is a possible way to mislead the user into enabling malicious phone calls forwarding due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:52:49 UTC

Technical Analysis

CVE-2025-22419 is a vulnerability affecting Google Android operating system versions 13, 14, and 15. It arises from multiple locations within the system where an attacker can leverage tapjacking or overlay attacks to deceive users into enabling malicious phone call forwarding. Tapjacking involves placing an invisible or misleading overlay on the screen that intercepts user taps, causing the user to unknowingly perform actions they did not intend. In this case, the attacker exploits this technique to manipulate the phone’s call forwarding settings, potentially redirecting calls to malicious numbers controlled by the attacker. The attack requires the attacker to have local execution privileges at the user level and necessitates user interaction, meaning the user must tap or interact with the device during the attack. The vulnerability is classified as an elevation of privilege because it allows an attacker to escalate their capabilities beyond what their current user permissions allow, potentially gaining unauthorized control over call forwarding features. The CVSS v3.1 base score is 7.3 (high severity), reflecting the significant impact on confidentiality, integrity, and availability if exploited. The vulnerability is tracked under CWE-1021, which pertains to improper restriction of operations within the bounds of a user interface, indicating a failure to properly restrict user interface interactions that can be exploited. Although no known exploits are currently reported in the wild, the vulnerability poses a serious risk due to the sensitive nature of call forwarding and the potential for abuse in intercepting or redirecting communications. No official patches have been linked yet, so mitigation currently relies on user awareness and limiting exposure to untrusted applications or links that could trigger the attack.

Potential Impact

The impact of CVE-2025-22419 is significant for organizations and individual users relying on Android devices for communication. Successful exploitation can lead to unauthorized call forwarding, enabling attackers to intercept, redirect, or manipulate phone calls, which compromises confidentiality and privacy. This can facilitate further attacks such as social engineering, fraud, or espionage. The integrity of call settings is compromised, potentially allowing attackers to alter device behavior without user consent. Availability can also be affected if call forwarding disrupts normal telephony services. For organizations, especially those with mobile workforces or sensitive communications, this vulnerability could lead to data leaks, unauthorized access to voice communications, and reputational damage. The requirement for user interaction limits automated exploitation but does not eliminate risk, as social engineering can be used to trick users. The lack of known exploits in the wild suggests the vulnerability is not yet actively exploited, but the high severity score indicates it should be treated as a priority once patches are available.

Mitigation Recommendations

1. Monitor official Google Android security bulletins for patches addressing CVE-2025-22419 and apply them promptly once released. 2. Educate users about the risks of tapjacking and overlay attacks, emphasizing caution when interacting with unexpected prompts or applications requesting permissions related to call settings. 3. Restrict installation of applications from untrusted sources or unknown developers to reduce exposure to malicious apps that could leverage this vulnerability. 4. Employ mobile device management (MDM) solutions to enforce security policies that limit the ability to install or run potentially harmful applications and to monitor call forwarding settings for unauthorized changes. 5. Encourage users to verify call forwarding settings regularly and report any unexpected changes immediately. 6. Implement runtime protections or overlay detection mechanisms where possible to prevent or alert on suspicious overlay activity. 7. For organizations, consider network-level monitoring for unusual call forwarding patterns or anomalies in telephony usage that could indicate exploitation attempts. These steps go beyond generic advice by focusing on user education, proactive monitoring, and leveraging enterprise controls to reduce risk until patches are available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-01-06T17:44:53.633Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b77090ad5a09ad00e9389a

Added to database: 9/2/2025, 10:32:48 PM

Last enriched: 2/27/2026, 12:52:49 AM

Last updated: 3/24/2026, 3:15:22 PM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses