Skip to main content

CVE-2025-22421: Information disclosure in Google Android

Medium
VulnerabilityCVE-2025-22421cvecve-2025-22421
Published: Tue Sep 02 2025 (09/02/2025, 22:11:12 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In contentDescForNotification of NotificationContentDescription.kt, there is a possible notification content leak through the lockscreen due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/02/2025, 22:50:53 UTC

Technical Analysis

CVE-2025-22421 is a vulnerability identified in the Android operating system, specifically affecting versions 13, 14, and 15. The flaw exists in the NotificationContentDescription.kt file, within the contentDescForNotification function. Due to a logic error in the code, notification content can be inadvertently leaked through the lockscreen. This means that sensitive information intended to be hidden when the device is locked may be exposed to anyone with physical access to the device without requiring any additional privileges or user interaction. The vulnerability is a local information disclosure issue, allowing an attacker with physical access to the device to view notification content that should be protected. Since no elevated execution privileges or user interaction are needed, the exploitability is straightforward once the attacker has access to the locked device. However, the attack vector is limited to local access rather than remote exploitation. The vulnerability does not currently have a CVSS score assigned, and no known exploits have been reported in the wild as of the publication date. The root cause is a logic error in how notification content descriptions are handled and displayed on the lockscreen, which bypasses intended privacy controls.

Potential Impact

For European organizations, the impact of this vulnerability primarily concerns the confidentiality of sensitive information displayed in notifications on Android devices used within the enterprise. Many organizations rely on Android smartphones for communication, including email, messaging apps, and enterprise applications that may display sensitive data in notifications. If an attacker gains physical access to a locked device, they could view confidential information such as meeting details, authentication codes, or private messages without unlocking the device. This could lead to information leakage, social engineering, or further targeted attacks. While the vulnerability does not allow remote compromise or device control, the risk is significant in environments where devices are frequently left unattended or lost/stolen, such as in fieldwork, public spaces, or during travel. The impact on integrity and availability is minimal, but the breach of confidentiality could violate data protection regulations like GDPR if personal or sensitive data is exposed. Organizations with strict data privacy requirements and those handling sensitive personal or corporate data on Android devices should consider this vulnerability a notable risk.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Apply security updates and patches from Google as soon as they become available for affected Android versions (13, 14, 15). 2) Configure device lockscreen notification settings to limit or disable the display of sensitive content on the lockscreen. This includes setting notifications to 'hide sensitive content' or 'do not show notifications at all' on the lockscreen. 3) Enforce device management policies via Mobile Device Management (MDM) solutions to centrally control notification visibility settings and ensure compliance. 4) Educate users about the risks of leaving devices unattended and the importance of physical security. 5) Consider additional endpoint protection measures such as full-disk encryption and strong authentication mechanisms to reduce the risk of unauthorized physical access. 6) Monitor for any updates or advisories from Google regarding this vulnerability and any emerging exploits.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-01-06T17:44:53.634Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b77090ad5a09ad00e9389e

Added to database: 9/2/2025, 10:32:48 PM

Last enriched: 9/2/2025, 10:50:53 PM

Last updated: 9/4/2025, 12:34:40 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats