Skip to main content

CVE-2025-26445: Information disclosure in Google Android

Medium
VulnerabilityCVE-2025-26445cvecve-2025-26445
Published: Thu Sep 04 2025 (09/04/2025, 17:14:56 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In offerNetwork of ConnectivityService.java, there is a possible leak of sensitive data due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/04/2025, 18:05:38 UTC

Technical Analysis

CVE-2025-26445 is a vulnerability identified in the ConnectivityService component of the Android operating system, specifically within the offerNetwork method of ConnectivityService.java. The flaw arises due to a missing permission check, which allows an attacker to access sensitive information locally without requiring any additional execution privileges or user interaction. This means that any application or process running on the affected Android versions (13, 14, and 15) could potentially exploit this vulnerability to leak sensitive data from the device. The vulnerability is classified as an information disclosure issue, which typically compromises confidentiality by exposing data that should otherwise be protected. Since the exploit does not require elevated privileges or user interaction, it significantly lowers the barrier for exploitation, making it easier for malicious actors to leverage this flaw in local attack scenarios. However, no known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The absence of a patch link suggests that either a fix is pending or not publicly disclosed at this time. Given the affected versions, this vulnerability impacts a broad range of modern Android devices, as Android 13, 14, and 15 represent recent and upcoming releases widely used across consumer and enterprise environments.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying heavily on Android devices for business operations, communication, and data access. The information disclosure could lead to leakage of sensitive corporate data, user credentials, or network configuration details, potentially facilitating further attacks such as targeted phishing, lateral movement, or espionage. Since the vulnerability does not require user interaction or elevated privileges, malicious apps or compromised software could silently exploit this flaw to gather intelligence from devices. This is particularly concerning for sectors with stringent data protection requirements such as finance, healthcare, and government agencies within Europe. Additionally, the GDPR framework mandates strict controls over personal data, and any leakage could result in regulatory penalties and reputational damage. The vulnerability's presence in recent Android versions means that a large portion of the European mobile workforce and consumers could be affected, increasing the attack surface for threat actors targeting European entities.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Monitor for official patches or security updates from Google and Android device manufacturers and prioritize their deployment across all affected devices running Android 13, 14, and 15. 2) Implement strict application vetting policies to limit installation of untrusted or unnecessary apps that could exploit local vulnerabilities. 3) Employ Mobile Device Management (MDM) solutions to enforce security policies, restrict app permissions, and detect anomalous behaviors indicative of exploitation attempts. 4) Educate users about the risks of installing apps from unofficial sources and encourage regular updates. 5) Use endpoint detection and response (EDR) tools capable of monitoring local privilege escalations or suspicious access patterns on mobile devices. 6) For highly sensitive environments, consider network segmentation and limiting device access to critical systems until patches are applied. 7) Engage with vendors and security communities to stay informed about emerging exploits or additional mitigations related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-02-10T18:29:43.943Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9d3bf88499799243bc1bb

Added to database: 9/4/2025, 6:00:31 PM

Last enriched: 9/4/2025, 6:05:38 PM

Last updated: 9/5/2025, 8:04:45 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats