CVE-2025-26435: Elevation of privilege in Google Android
In updateState of ContentProtectionTogglePreferenceController.java, there is a possible way for a secondary user to disable the primary user's deceptive app scanning setting due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
AI Analysis
Technical Summary
CVE-2025-26435 is a high-severity elevation of privilege vulnerability affecting Google Android version 15. The flaw exists in the updateState method of the ContentProtectionTogglePreferenceController.java component. Specifically, a logic error allows a secondary user on the device to disable the primary user's deceptive app scanning setting. This setting is designed to protect the primary user by scanning apps for deceptive or malicious behavior. Due to the logic error, the secondary user can manipulate this setting without requiring additional execution privileges or user interaction, leading to a local privilege escalation. The vulnerability is classified under CWE-269 (Improper Privilege Management), indicating that the system fails to properly restrict access rights. Exploitation does not require user interaction, and the attacker only needs local access as a secondary user on the device. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and low privileges required. Although no known exploits are reported in the wild yet, the vulnerability poses a significant risk because it undermines the security controls protecting the primary user’s environment, potentially allowing unauthorized changes to security settings and exposing the device to further compromise.
Potential Impact
For European organizations, this vulnerability poses a considerable risk especially in environments where Android devices are shared among multiple users or where secondary user profiles are enabled for operational or security reasons. The ability for a secondary user to disable deceptive app scanning could lead to the installation or execution of malicious applications without detection, compromising device confidentiality and integrity. This could result in data leakage, unauthorized access to sensitive corporate information, and disruption of business operations. In sectors such as finance, healthcare, and government, where Android devices are used for sensitive communications and data access, the impact could be severe. Additionally, the vulnerability could be exploited in corporate Bring Your Own Device (BYOD) scenarios, where multiple user profiles might exist on a single device. The lack of user interaction requirement increases the risk of stealthy exploitation. Overall, the vulnerability could facilitate lateral movement within corporate networks or enable attackers to bypass security controls, increasing the attack surface for European organizations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should prioritize updating Android devices to patched versions once Google releases a fix. Until a patch is available, organizations should consider disabling secondary user profiles on Android devices used in sensitive environments to prevent exploitation. Implement strict device usage policies that limit the creation and use of secondary users, especially on corporate devices. Employ Mobile Device Management (MDM) solutions to enforce security configurations and monitor changes to security-related settings such as deceptive app scanning. Conduct regular audits of device configurations and user profiles to detect unauthorized modifications. Educate users about the risks of sharing devices or profiles and encourage the use of dedicated devices for sensitive tasks. Additionally, organizations should monitor for unusual activity that could indicate attempts to exploit this vulnerability, such as unexpected changes in security settings or installation of untrusted applications. Finally, collaborate with vendors and security communities to stay informed about patches and emerging exploit techniques related to this CVE.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Ireland
CVE-2025-26435: Elevation of privilege in Google Android
Description
In updateState of ContentProtectionTogglePreferenceController.java, there is a possible way for a secondary user to disable the primary user's deceptive app scanning setting due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2025-26435 is a high-severity elevation of privilege vulnerability affecting Google Android version 15. The flaw exists in the updateState method of the ContentProtectionTogglePreferenceController.java component. Specifically, a logic error allows a secondary user on the device to disable the primary user's deceptive app scanning setting. This setting is designed to protect the primary user by scanning apps for deceptive or malicious behavior. Due to the logic error, the secondary user can manipulate this setting without requiring additional execution privileges or user interaction, leading to a local privilege escalation. The vulnerability is classified under CWE-269 (Improper Privilege Management), indicating that the system fails to properly restrict access rights. Exploitation does not require user interaction, and the attacker only needs local access as a secondary user on the device. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and low privileges required. Although no known exploits are reported in the wild yet, the vulnerability poses a significant risk because it undermines the security controls protecting the primary user’s environment, potentially allowing unauthorized changes to security settings and exposing the device to further compromise.
Potential Impact
For European organizations, this vulnerability poses a considerable risk especially in environments where Android devices are shared among multiple users or where secondary user profiles are enabled for operational or security reasons. The ability for a secondary user to disable deceptive app scanning could lead to the installation or execution of malicious applications without detection, compromising device confidentiality and integrity. This could result in data leakage, unauthorized access to sensitive corporate information, and disruption of business operations. In sectors such as finance, healthcare, and government, where Android devices are used for sensitive communications and data access, the impact could be severe. Additionally, the vulnerability could be exploited in corporate Bring Your Own Device (BYOD) scenarios, where multiple user profiles might exist on a single device. The lack of user interaction requirement increases the risk of stealthy exploitation. Overall, the vulnerability could facilitate lateral movement within corporate networks or enable attackers to bypass security controls, increasing the attack surface for European organizations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should prioritize updating Android devices to patched versions once Google releases a fix. Until a patch is available, organizations should consider disabling secondary user profiles on Android devices used in sensitive environments to prevent exploitation. Implement strict device usage policies that limit the creation and use of secondary users, especially on corporate devices. Employ Mobile Device Management (MDM) solutions to enforce security configurations and monitor changes to security-related settings such as deceptive app scanning. Conduct regular audits of device configurations and user profiles to detect unauthorized modifications. Educate users about the risks of sharing devices or profiles and encourage the use of dedicated devices for sensitive tasks. Additionally, organizations should monitor for unusual activity that could indicate attempts to exploit this vulnerability, such as unexpected changes in security settings or installation of untrusted applications. Finally, collaborate with vendors and security communities to stay informed about patches and emerging exploit techniques related to this CVE.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- google_android
- Date Reserved
- 2025-02-10T18:29:32.999Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b9d3be88499799243bc185
Added to database: 9/4/2025, 6:00:30 PM
Last enriched: 9/11/2025, 8:05:46 PM
Last updated: 10/16/2025, 7:22:01 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61553: n/a
UnknownCVE-2025-11853: Improper Access Controls in Sismics Teedy
MediumCVE-2025-11852: Missing Authentication in Apeman ID71
MediumCVE-2025-11493: CWE-494 Download of Code Without Integrity Check in ConnectWise Automate
HighCVE-2025-11492: CWE-319 Cleartext Transmission of Sensitive Information in ConnectWise Automate
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.