Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26419: Elevation of privilege in Google Android

0
Low
VulnerabilityCVE-2025-26419cvecve-2025-26419
Published: Thu Sep 04 2025 (09/04/2025, 19:28:08 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In initPhoneSwitch of SystemSettingsFragment.java, there is a possible FRP bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

AI-Powered Analysis

AILast updated: 09/11/2025, 19:57:56 UTC

Technical Analysis

CVE-2025-26419 is a vulnerability identified in Google Android versions 13 and 14, specifically within the initPhoneSwitch function of the SystemSettingsFragment.java component. The flaw arises from a logic error that allows a possible Factory Reset Protection (FRP) bypass. FRP is a security feature designed to prevent unauthorized use of a device after a factory reset by requiring the original account credentials. The vulnerability enables a local attacker to escalate privileges without needing additional execution privileges, but it requires user interaction to be exploited. The weakness is categorized under CWE-290, which relates to improper authentication mechanisms. The CVSS score of 3.3 (low severity) reflects limited impact, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and limited confidentiality impact (C:L) without integrity or availability impacts. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability could allow an attacker with physical or local access to bypass FRP protections, potentially gaining unauthorized access to device settings or data that should be protected post-reset.

Potential Impact

For European organizations, the impact of CVE-2025-26419 is relatively limited due to its low severity and requirement for local access and user interaction. However, organizations with employees using Android 13 or 14 devices, especially those handling sensitive or regulated data, could face risks if devices are lost, stolen, or accessed by unauthorized personnel. The FRP bypass could allow attackers to circumvent security controls designed to protect data after a factory reset, potentially leading to unauthorized access to corporate data or device settings. This is particularly relevant for sectors with strict data protection requirements such as finance, healthcare, and government agencies in Europe. While the vulnerability does not directly compromise data confidentiality or device integrity remotely, it weakens a critical security control that protects against device misuse after loss or theft, increasing the risk of insider threats or targeted local attacks.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Enforce strong physical security controls and device management policies to minimize unauthorized local access to Android devices. 2) Use Mobile Device Management (MDM) solutions to monitor device compliance and remotely wipe or lock devices if lost or stolen. 3) Educate users about the risks of interacting with unknown prompts or applications that could trigger this vulnerability. 4) Monitor for updates from Google and apply security patches promptly once available, as no patch is currently linked. 5) Consider additional endpoint protection solutions that can detect anomalous privilege escalations or unauthorized configuration changes on Android devices. 6) For highly sensitive environments, consider restricting use of Android devices to versions not affected or deploying additional authentication layers beyond FRP where possible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-02-10T18:15:39.001Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9ead188499799243c8783

Added to database: 9/4/2025, 7:38:57 PM

Last enriched: 9/11/2025, 7:57:56 PM

Last updated: 10/16/2025, 11:46:50 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats