Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26437: Information disclosure in Google Android

0
Medium
VulnerabilityCVE-2025-26437cvecve-2025-26437
Published: Thu Sep 04 2025 (09/04/2025, 17:14:53 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In CredentialManagerServiceStub of CredentialManagerService.java, there is a possible way to retrieve candidate credentials due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/11/2025, 20:17:11 UTC

Technical Analysis

CVE-2025-26437 is a medium-severity information disclosure vulnerability affecting Google Android version 15. The flaw exists in the CredentialManagerServiceStub component of CredentialManagerService.java, where a missing permission check allows an attacker to retrieve candidate credentials stored or managed by the service. This vulnerability is classified under CWE-862 (Missing Authorization) and does not require additional execution privileges or user interaction to exploit. The attack vector is local, meaning an attacker must have local access to the device, but once present, they can access sensitive credential information without proper authorization. The vulnerability impacts confidentiality by exposing potentially sensitive credential data, but does not affect integrity or availability. The CVSS 3.1 score is 5.5 (medium), reflecting the moderate risk due to local access requirements and lack of privilege escalation. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability highlights a critical gap in permission enforcement within Android's credential management framework, which could be leveraged by malicious local applications or users to harvest credentials without detection or consent.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to mobile devices running Android 15 that are used within corporate environments. Exposure of candidate credentials could lead to unauthorized access to corporate accounts, services, or applications if these credentials are reused or linked to enterprise resources. This is particularly concerning for sectors with high mobile workforce usage such as finance, healthcare, and government agencies. The local access requirement limits remote exploitation but insider threats or compromised devices could exploit this flaw to escalate access or move laterally within networks. The confidentiality breach could undermine trust in mobile device security and lead to regulatory compliance issues under GDPR if personal or sensitive data is exposed. Additionally, organizations relying on Android devices for multi-factor authentication or credential storage may see increased risk of credential theft and subsequent account compromise.

Mitigation Recommendations

Organizations should prioritize updating Android devices to patched versions once available from Google. Until patches are released, strict device access controls should be enforced, including strong lock screen protections and limiting physical access to devices. Employ mobile device management (MDM) solutions to monitor and restrict installation of untrusted or potentially malicious local applications that could exploit this vulnerability. Regularly audit credential storage and usage policies to minimize sensitive credential exposure on devices. Implement additional layers of authentication and credential validation on enterprise services to reduce the impact of credential disclosure. Educate users about the risks of local device compromise and encourage prompt reporting of lost or stolen devices. Finally, monitor security advisories from Google for updates or patches addressing this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-02-10T18:29:32.999Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9d3be88499799243bc18e

Added to database: 9/4/2025, 6:00:30 PM

Last enriched: 9/11/2025, 8:17:11 PM

Last updated: 10/17/2025, 5:05:36 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats