Skip to main content

CVE-2025-26437: Information disclosure in Google Android

High
VulnerabilityCVE-2025-26437cvecve-2025-26437
Published: Thu Sep 04 2025 (09/04/2025, 17:14:53 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In CredentialManagerServiceStub of CredentialManagerService.java, there is a possible way to retrieve candidate credentials due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/04/2025, 18:04:18 UTC

Technical Analysis

CVE-2025-26437 is a security vulnerability identified in the CredentialManagerServiceStub component of the CredentialManagerService.java file within Google Android version 15. The flaw arises due to a missing permission check that allows an attacker to retrieve candidate credentials stored or managed by the Credential Manager service. This vulnerability leads to local information disclosure, meaning an attacker with local access to the device can extract sensitive credential information without requiring any additional execution privileges or elevated permissions. Furthermore, exploitation does not require any user interaction, which increases the risk of automated or stealthy attacks. The vulnerability is rooted in improper access control within the Android Credential Manager service, which is responsible for handling user credentials securely. Since the issue allows unauthorized access to credential data, it poses a significant risk to user privacy and security, potentially exposing passwords, tokens, or other authentication secrets stored on the device. No known public exploits have been reported in the wild as of the publication date, and no patches or fixes have been linked yet. The absence of a CVSS score indicates that the vulnerability is newly disclosed and may require further assessment and prioritization by security teams.

Potential Impact

For European organizations, this vulnerability could have serious implications, especially for enterprises and government agencies that rely on Android devices for secure communication and access to sensitive systems. The disclosure of candidate credentials can lead to unauthorized access to corporate accounts, internal applications, or cloud services, potentially resulting in data breaches or lateral movement within networks. Since the vulnerability can be exploited locally without user interaction, it increases the risk from insider threats or malware that gains initial foothold on devices. The impact is particularly critical for sectors with stringent data protection requirements under GDPR, as credential leakage could lead to unauthorized processing of personal data and subsequent regulatory penalties. Additionally, the compromise of credentials could undermine multi-factor authentication schemes if the leaked credentials include tokens or backup authentication secrets. The lack of a patch at the time of disclosure means organizations must be vigilant in monitoring and controlling device access until a fix is available.

Mitigation Recommendations

1. Enforce strict physical and logical access controls on Android devices to limit local access to trusted users only. 2. Employ Mobile Device Management (MDM) solutions to monitor device integrity and detect suspicious activities that could indicate exploitation attempts. 3. Encourage users to enable device encryption and strong lock screen protections to reduce the risk of unauthorized local access. 4. Limit the installation of untrusted or unnecessary applications that could leverage local access to exploit this vulnerability. 5. Monitor for updates from Google and apply security patches promptly once available. 6. Consider implementing additional credential protection mechanisms such as hardware-backed keystores or biometric authentication to reduce reliance on software-managed credentials. 7. Conduct regular security awareness training to inform users about the risks of local device compromise and the importance of device security hygiene. 8. For highly sensitive environments, consider restricting the use of Android 15 devices until a patch is released or deploying alternative secure platforms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-02-10T18:29:32.999Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9d3be88499799243bc18e

Added to database: 9/4/2025, 6:00:30 PM

Last enriched: 9/4/2025, 6:04:18 PM

Last updated: 9/4/2025, 6:04:18 PM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats