Skip to main content

CVE-2025-22428: Elevation of privilege in Google Android

High
VulnerabilityCVE-2025-22428cvecve-2025-22428
Published: Tue Sep 02 2025 (09/02/2025, 22:11:16 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In hasInteractAcrossUsersFullPermission of AppInfoBase.java, there is a possible way to grant permissions to an app on the secondary user from the primary user due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/02/2025, 22:50:02 UTC

Technical Analysis

CVE-2025-22428 is a local elevation of privilege vulnerability affecting Google Android versions 13, 14, and 15. The flaw exists in the hasInteractAcrossUsersFullPermission method within the AppInfoBase.java component. Due to a logic error, an application running under a secondary user profile can be granted permissions from the primary user profile without proper authorization checks. This vulnerability allows an attacker with local access to escalate privileges from a secondary user context to gain higher permissions, potentially those of the primary user. Notably, exploitation does not require any additional execution privileges or user interaction, making it easier for a local attacker or malicious app to leverage this flaw. Although no known exploits are currently reported in the wild, the vulnerability’s presence in recent Android versions used widely across devices means it poses a significant risk. The absence of a CVSS score indicates that the vulnerability is newly disclosed, and detailed impact metrics have yet to be formally assessed. However, the technical details suggest a serious security weakness in Android’s multi-user permission model that could be abused to bypass user separation and privilege boundaries on affected devices.

Potential Impact

For European organizations, the impact of CVE-2025-22428 could be substantial, especially for enterprises and government agencies that deploy Android devices with multi-user configurations or use Android tablets and smartphones in shared environments. An attacker exploiting this vulnerability could escalate privileges locally, potentially gaining access to sensitive data or administrative functions reserved for the primary user. This could lead to unauthorized data access, manipulation, or installation of persistent malicious software. In sectors such as finance, healthcare, and critical infrastructure, where Android devices are used for secure communications or operational control, this vulnerability could undermine device integrity and confidentiality. Additionally, the lack of required user interaction increases the risk of stealthy exploitation. Although the vulnerability requires local access, compromised or malicious apps could exploit it to elevate privileges without detection. This elevates the threat level for organizations relying on Android devices for secure operations, especially if endpoint security controls are insufficient to detect privilege escalation attempts.

Mitigation Recommendations

To mitigate CVE-2025-22428, organizations should prioritize updating affected Android devices to patched versions as soon as Google releases security updates addressing this flaw. Until patches are available, organizations should restrict installation of untrusted or third-party applications, especially those requesting permissions related to user management or cross-user interactions. Employing mobile device management (MDM) solutions to enforce strict app whitelisting and permission controls can reduce the attack surface. Additionally, disabling or limiting multi-user profiles on corporate devices where not needed can minimize exposure. Security teams should monitor device logs for unusual permission changes or privilege escalations and conduct regular audits of installed applications. User education about the risks of installing apps from unverified sources is also critical. For high-security environments, consider deploying endpoint detection and response (EDR) tools capable of identifying local privilege escalation behaviors on Android platforms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-01-06T17:45:03.361Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b77090ad5a09ad00e938af

Added to database: 9/2/2025, 10:32:48 PM

Last enriched: 9/2/2025, 10:50:02 PM

Last updated: 9/4/2025, 10:24:25 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats