Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26435: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-26435cvecve-2025-26435
Published: Thu Sep 04 2025 (09/04/2025, 17:11:55 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In updateState of ContentProtectionTogglePreferenceController.java, there is a possible way for a secondary user to disable the primary user's deceptive app scanning setting due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/11/2025, 20:05:46 UTC

Technical Analysis

CVE-2025-26435 is a high-severity elevation of privilege vulnerability affecting Google Android version 15. The flaw exists in the updateState method of the ContentProtectionTogglePreferenceController.java component. Specifically, a logic error allows a secondary user on the device to disable the primary user's deceptive app scanning setting. This setting is designed to protect the primary user by scanning apps for deceptive or malicious behavior. Due to the logic error, the secondary user can manipulate this setting without requiring additional execution privileges or user interaction, leading to a local privilege escalation. The vulnerability is classified under CWE-269 (Improper Privilege Management), indicating that the system fails to properly restrict access rights. Exploitation does not require user interaction, and the attacker only needs local access as a secondary user on the device. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and low privileges required. Although no known exploits are reported in the wild yet, the vulnerability poses a significant risk because it undermines the security controls protecting the primary user’s environment, potentially allowing unauthorized changes to security settings and exposing the device to further compromise.

Potential Impact

For European organizations, this vulnerability poses a considerable risk especially in environments where Android devices are shared among multiple users or where secondary user profiles are enabled for operational or security reasons. The ability for a secondary user to disable deceptive app scanning could lead to the installation or execution of malicious applications without detection, compromising device confidentiality and integrity. This could result in data leakage, unauthorized access to sensitive corporate information, and disruption of business operations. In sectors such as finance, healthcare, and government, where Android devices are used for sensitive communications and data access, the impact could be severe. Additionally, the vulnerability could be exploited in corporate Bring Your Own Device (BYOD) scenarios, where multiple user profiles might exist on a single device. The lack of user interaction requirement increases the risk of stealthy exploitation. Overall, the vulnerability could facilitate lateral movement within corporate networks or enable attackers to bypass security controls, increasing the attack surface for European organizations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should prioritize updating Android devices to patched versions once Google releases a fix. Until a patch is available, organizations should consider disabling secondary user profiles on Android devices used in sensitive environments to prevent exploitation. Implement strict device usage policies that limit the creation and use of secondary users, especially on corporate devices. Employ Mobile Device Management (MDM) solutions to enforce security configurations and monitor changes to security-related settings such as deceptive app scanning. Conduct regular audits of device configurations and user profiles to detect unauthorized modifications. Educate users about the risks of sharing devices or profiles and encourage the use of dedicated devices for sensitive tasks. Additionally, organizations should monitor for unusual activity that could indicate attempts to exploit this vulnerability, such as unexpected changes in security settings or installation of untrusted applications. Finally, collaborate with vendors and security communities to stay informed about patches and emerging exploit techniques related to this CVE.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-02-10T18:29:32.999Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9d3be88499799243bc185

Added to database: 9/4/2025, 6:00:30 PM

Last enriched: 9/11/2025, 8:05:46 PM

Last updated: 10/16/2025, 7:22:01 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats