CVE-2025-26419: Elevation of privilege in Google Android
In initPhoneSwitch of SystemSettingsFragment.java, there is a possible FRP bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
AI Analysis
Technical Summary
CVE-2025-26419 is a vulnerability identified in Google Android versions 13 and 14, specifically within the initPhoneSwitch function of the SystemSettingsFragment.java component. The flaw arises from a logic error that allows a possible Factory Reset Protection (FRP) bypass. FRP is a security feature designed to prevent unauthorized use of a device after a factory reset by requiring the original account credentials. The vulnerability enables a local attacker to escalate privileges without needing additional execution privileges, but it requires user interaction to be exploited. The weakness is categorized under CWE-290, which relates to improper authentication mechanisms. The CVSS score of 3.3 (low severity) reflects limited impact, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and limited confidentiality impact (C:L) without integrity or availability impacts. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability could allow an attacker with physical or local access to bypass FRP protections, potentially gaining unauthorized access to device settings or data that should be protected post-reset.
Potential Impact
For European organizations, the impact of CVE-2025-26419 is relatively limited due to its low severity and requirement for local access and user interaction. However, organizations with employees using Android 13 or 14 devices, especially those handling sensitive or regulated data, could face risks if devices are lost, stolen, or accessed by unauthorized personnel. The FRP bypass could allow attackers to circumvent security controls designed to protect data after a factory reset, potentially leading to unauthorized access to corporate data or device settings. This is particularly relevant for sectors with strict data protection requirements such as finance, healthcare, and government agencies in Europe. While the vulnerability does not directly compromise data confidentiality or device integrity remotely, it weakens a critical security control that protects against device misuse after loss or theft, increasing the risk of insider threats or targeted local attacks.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Enforce strong physical security controls and device management policies to minimize unauthorized local access to Android devices. 2) Use Mobile Device Management (MDM) solutions to monitor device compliance and remotely wipe or lock devices if lost or stolen. 3) Educate users about the risks of interacting with unknown prompts or applications that could trigger this vulnerability. 4) Monitor for updates from Google and apply security patches promptly once available, as no patch is currently linked. 5) Consider additional endpoint protection solutions that can detect anomalous privilege escalations or unauthorized configuration changes on Android devices. 6) For highly sensitive environments, consider restricting use of Android devices to versions not affected or deploying additional authentication layers beyond FRP where possible.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland
CVE-2025-26419: Elevation of privilege in Google Android
Description
In initPhoneSwitch of SystemSettingsFragment.java, there is a possible FRP bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2025-26419 is a vulnerability identified in Google Android versions 13 and 14, specifically within the initPhoneSwitch function of the SystemSettingsFragment.java component. The flaw arises from a logic error that allows a possible Factory Reset Protection (FRP) bypass. FRP is a security feature designed to prevent unauthorized use of a device after a factory reset by requiring the original account credentials. The vulnerability enables a local attacker to escalate privileges without needing additional execution privileges, but it requires user interaction to be exploited. The weakness is categorized under CWE-290, which relates to improper authentication mechanisms. The CVSS score of 3.3 (low severity) reflects limited impact, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and limited confidentiality impact (C:L) without integrity or availability impacts. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability could allow an attacker with physical or local access to bypass FRP protections, potentially gaining unauthorized access to device settings or data that should be protected post-reset.
Potential Impact
For European organizations, the impact of CVE-2025-26419 is relatively limited due to its low severity and requirement for local access and user interaction. However, organizations with employees using Android 13 or 14 devices, especially those handling sensitive or regulated data, could face risks if devices are lost, stolen, or accessed by unauthorized personnel. The FRP bypass could allow attackers to circumvent security controls designed to protect data after a factory reset, potentially leading to unauthorized access to corporate data or device settings. This is particularly relevant for sectors with strict data protection requirements such as finance, healthcare, and government agencies in Europe. While the vulnerability does not directly compromise data confidentiality or device integrity remotely, it weakens a critical security control that protects against device misuse after loss or theft, increasing the risk of insider threats or targeted local attacks.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Enforce strong physical security controls and device management policies to minimize unauthorized local access to Android devices. 2) Use Mobile Device Management (MDM) solutions to monitor device compliance and remotely wipe or lock devices if lost or stolen. 3) Educate users about the risks of interacting with unknown prompts or applications that could trigger this vulnerability. 4) Monitor for updates from Google and apply security patches promptly once available, as no patch is currently linked. 5) Consider additional endpoint protection solutions that can detect anomalous privilege escalations or unauthorized configuration changes on Android devices. 6) For highly sensitive environments, consider restricting use of Android devices to versions not affected or deploying additional authentication layers beyond FRP where possible.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- google_android
- Date Reserved
- 2025-02-10T18:15:39.001Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b9ead188499799243c8783
Added to database: 9/4/2025, 7:38:57 PM
Last enriched: 9/11/2025, 7:57:56 PM
Last updated: 10/16/2025, 11:46:50 PM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-23073: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Wikimedia Foundation Mediawiki - GlobalBlocking Extension
LowCVE-2025-62504: CWE-416: Use After Free in envoyproxy envoy
MediumCVE-2025-11864: Server-Side Request Forgery in NucleoidAI Nucleoid
MediumCVE-2024-42192: CWE-522 Insufficiently Protected Credentials in HCL Software Traveler for Microsoft Outlook
MediumCVE-2025-60358: n/a
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.