CVE-2025-26437: Information disclosure in Google Android
In CredentialManagerServiceStub of CredentialManagerService.java, there is a possible way to retrieve candidate credentials due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
AI Analysis
Technical Summary
CVE-2025-26437 is a medium-severity information disclosure vulnerability affecting Google Android version 15. The flaw exists in the CredentialManagerServiceStub component of CredentialManagerService.java, where a missing permission check allows an attacker to retrieve candidate credentials stored or managed by the service. This vulnerability is classified under CWE-862 (Missing Authorization) and does not require additional execution privileges or user interaction to exploit. The attack vector is local, meaning an attacker must have local access to the device, but once present, they can access sensitive credential information without proper authorization. The vulnerability impacts confidentiality by exposing potentially sensitive credential data, but does not affect integrity or availability. The CVSS 3.1 score is 5.5 (medium), reflecting the moderate risk due to local access requirements and lack of privilege escalation. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability highlights a critical gap in permission enforcement within Android's credential management framework, which could be leveraged by malicious local applications or users to harvest credentials without detection or consent.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to mobile devices running Android 15 that are used within corporate environments. Exposure of candidate credentials could lead to unauthorized access to corporate accounts, services, or applications if these credentials are reused or linked to enterprise resources. This is particularly concerning for sectors with high mobile workforce usage such as finance, healthcare, and government agencies. The local access requirement limits remote exploitation but insider threats or compromised devices could exploit this flaw to escalate access or move laterally within networks. The confidentiality breach could undermine trust in mobile device security and lead to regulatory compliance issues under GDPR if personal or sensitive data is exposed. Additionally, organizations relying on Android devices for multi-factor authentication or credential storage may see increased risk of credential theft and subsequent account compromise.
Mitigation Recommendations
Organizations should prioritize updating Android devices to patched versions once available from Google. Until patches are released, strict device access controls should be enforced, including strong lock screen protections and limiting physical access to devices. Employ mobile device management (MDM) solutions to monitor and restrict installation of untrusted or potentially malicious local applications that could exploit this vulnerability. Regularly audit credential storage and usage policies to minimize sensitive credential exposure on devices. Implement additional layers of authentication and credential validation on enterprise services to reduce the impact of credential disclosure. Educate users about the risks of local device compromise and encourage prompt reporting of lost or stolen devices. Finally, monitor security advisories from Google for updates or patches addressing this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Ireland
CVE-2025-26437: Information disclosure in Google Android
Description
In CredentialManagerServiceStub of CredentialManagerService.java, there is a possible way to retrieve candidate credentials due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2025-26437 is a medium-severity information disclosure vulnerability affecting Google Android version 15. The flaw exists in the CredentialManagerServiceStub component of CredentialManagerService.java, where a missing permission check allows an attacker to retrieve candidate credentials stored or managed by the service. This vulnerability is classified under CWE-862 (Missing Authorization) and does not require additional execution privileges or user interaction to exploit. The attack vector is local, meaning an attacker must have local access to the device, but once present, they can access sensitive credential information without proper authorization. The vulnerability impacts confidentiality by exposing potentially sensitive credential data, but does not affect integrity or availability. The CVSS 3.1 score is 5.5 (medium), reflecting the moderate risk due to local access requirements and lack of privilege escalation. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability highlights a critical gap in permission enforcement within Android's credential management framework, which could be leveraged by malicious local applications or users to harvest credentials without detection or consent.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to mobile devices running Android 15 that are used within corporate environments. Exposure of candidate credentials could lead to unauthorized access to corporate accounts, services, or applications if these credentials are reused or linked to enterprise resources. This is particularly concerning for sectors with high mobile workforce usage such as finance, healthcare, and government agencies. The local access requirement limits remote exploitation but insider threats or compromised devices could exploit this flaw to escalate access or move laterally within networks. The confidentiality breach could undermine trust in mobile device security and lead to regulatory compliance issues under GDPR if personal or sensitive data is exposed. Additionally, organizations relying on Android devices for multi-factor authentication or credential storage may see increased risk of credential theft and subsequent account compromise.
Mitigation Recommendations
Organizations should prioritize updating Android devices to patched versions once available from Google. Until patches are released, strict device access controls should be enforced, including strong lock screen protections and limiting physical access to devices. Employ mobile device management (MDM) solutions to monitor and restrict installation of untrusted or potentially malicious local applications that could exploit this vulnerability. Regularly audit credential storage and usage policies to minimize sensitive credential exposure on devices. Implement additional layers of authentication and credential validation on enterprise services to reduce the impact of credential disclosure. Educate users about the risks of local device compromise and encourage prompt reporting of lost or stolen devices. Finally, monitor security advisories from Google for updates or patches addressing this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- google_android
- Date Reserved
- 2025-02-10T18:29:32.999Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b9d3be88499799243bc18e
Added to database: 9/4/2025, 6:00:30 PM
Last enriched: 9/11/2025, 8:17:11 PM
Last updated: 10/17/2025, 5:05:36 PM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62168: CWE-209: Generation of Error Message Containing Sensitive Information in squid-cache squid
CriticalMicrosoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US
MediumCVE-2025-8414: CWE-20 Improper Input Validation in silabs.com Simplicity SDK
CriticalCVE-2024-46910: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Apache Software Foundation Apache Atlas
HighCVE-2025-58747: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in langgenius dify
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.