Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26428: Elevation of privilege in Google Android

0
Low
VulnerabilityCVE-2025-26428cvecve-2025-26428
Published: Thu Sep 04 2025 (09/04/2025, 17:11:52 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In startLockTaskMode of LockTaskController.java, there is a possible lock screen bypass due to a logic error in the code. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

AI-Powered Analysis

AILast updated: 09/11/2025, 20:34:57 UTC

Technical Analysis

CVE-2025-26428 is a vulnerability identified in the Android operating system, specifically affecting versions 13, 14, and 15. The flaw exists in the startLockTaskMode method of the LockTaskController.java component. This vulnerability arises from a logic error that can lead to a lock screen bypass. Essentially, the flaw allows an attacker to escalate physical privileges on the device without requiring any additional execution privileges. However, exploitation requires user interaction, meaning the attacker must trick or convince the user to perform some action to trigger the vulnerability. The vulnerability is categorized under CWE-290, which relates to authentication issues, indicating that the logic error compromises the intended authentication or access control mechanisms. The CVSS v3.1 base score is 3.2, reflecting a low severity rating. The vector string (AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N) indicates that the attack requires physical access (AV:P), low attack complexity (AC:L), no privileges required (PR:N), user interaction (UI:R), unchanged scope (S:U), and results in low impact on confidentiality and integrity, with no impact on availability. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability could allow an attacker with physical access and the ability to engage the user to bypass the lock screen, potentially gaining unauthorized access to the device's data or functions that are normally protected by the lock screen mechanism.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the use of affected Android versions within their mobile device fleets. Since the vulnerability allows a lock screen bypass with physical access and user interaction, it poses a risk primarily in scenarios where devices are lost, stolen, or temporarily accessible to unauthorized individuals. Confidentiality and integrity of data on affected devices could be compromised, potentially exposing sensitive corporate information or enabling unauthorized actions. The low CVSS score and requirement for user interaction reduce the likelihood of widespread automated exploitation; however, targeted attacks or social engineering could still be effective. This is particularly relevant for sectors with high security requirements such as finance, government, healthcare, and critical infrastructure in Europe. The vulnerability could also undermine device trust in Bring Your Own Device (BYOD) environments, increasing the risk of insider threats or data leakage. Given the physical access requirement, remote exploitation is not feasible, limiting the threat to scenarios involving direct device access.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Ensure all Android devices are updated to the latest available versions once Google releases patches addressing CVE-2025-26428. 2) Implement strict physical security controls to prevent unauthorized access to devices, including secure storage and policies for lost or stolen devices. 3) Educate users about the risks of social engineering and the importance of not interacting with suspicious prompts or requests that could trigger the vulnerability. 4) Employ mobile device management (MDM) solutions to enforce strong lock screen policies, remote wipe capabilities, and monitoring for unusual device behavior. 5) Consider additional authentication mechanisms such as biometric locks or multi-factor authentication to reduce reliance on the vulnerable lock screen logic. 6) For high-risk environments, restrict the use of affected Android versions or devices until patches are available. 7) Regularly audit device compliance and user adherence to security policies to detect and respond to potential exploitation attempts promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-02-10T18:16:18.440Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9d3be88499799243bc175

Added to database: 9/4/2025, 6:00:30 PM

Last enriched: 9/11/2025, 8:34:57 PM

Last updated: 10/18/2025, 7:57:30 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats