Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26448: Information disclosure in Google Android

0
Medium
VulnerabilityCVE-2025-26448cvecve-2025-26448
Published: Thu Sep 04 2025 (09/04/2025, 17:14:57 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In writeToParcel of CursorWindow.cpp, there is a possible out of bounds read due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/11/2025, 20:17:57 UTC

Technical Analysis

CVE-2025-26448 is a medium severity information disclosure vulnerability affecting Google Android versions 13, 14, and 15. The flaw exists in the writeToParcel function of the CursorWindow.cpp component, where an out-of-bounds read can occur due to uninitialized data being accessed. This vulnerability is classified under CWE-457 (Use of Uninitialized Variable). The issue allows a local attacker with limited privileges (PR:L) to read sensitive information from memory without requiring any user interaction (UI:N). The attack vector is local (AV:L), meaning the attacker must have local access to the device, but no additional execution privileges are needed beyond what is already available. The vulnerability does not impact integrity or availability but can lead to a high impact on confidentiality by exposing potentially sensitive data stored in memory buffers. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on September 4, 2025, and was reserved earlier in February 2025. The CVSS v3.1 base score is 5.5, reflecting a medium severity rating. The vulnerability could be exploited by malicious apps or local users to extract sensitive information from the device memory, potentially leading to privacy violations or aiding further attacks by leaking internal state data. Since no user interaction is needed, exploitation can be stealthy once local access is obtained. The vulnerability affects recent Android versions, which are widely deployed on mobile devices globally.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to mobile devices running Android versions 13 through 15, which are common in enterprise and consumer environments. The information disclosure could lead to leakage of sensitive corporate data, credentials, or personally identifiable information (PII) stored or processed on affected devices. This could facilitate targeted phishing, credential theft, or lateral movement within corporate networks if attackers gain local access. The lack of required user interaction increases the risk of stealthy exploitation by malicious insiders or compromised apps. While the vulnerability does not allow code execution or denial of service, the confidentiality breach could have regulatory implications under GDPR, especially if personal data is exposed. Organizations relying on Android devices for secure communications, mobile workforce, or BYOD policies should be aware of this risk. The absence of known exploits in the wild currently reduces immediate threat but does not eliminate the risk of future exploitation. The vulnerability also highlights the importance of controlling local access to devices and monitoring for suspicious app behavior.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Ensure timely updates and patches from Google are applied as soon as they become available for Android versions 13-15. 2) Enforce strict mobile device management (MDM) policies to restrict installation of untrusted or unnecessary applications that could exploit local vulnerabilities. 3) Limit local access to devices by enforcing strong authentication and physical security controls to prevent unauthorized users from gaining local access. 4) Monitor device behavior for unusual activity that could indicate exploitation attempts, such as unexpected memory access patterns or app behavior anomalies. 5) Educate users about risks of installing apps from untrusted sources and the importance of device security hygiene. 6) Consider deploying endpoint detection and response (EDR) solutions capable of detecting suspicious local activity on mobile devices. 7) Review and audit applications with elevated privileges to ensure they do not inadvertently expose sensitive data through IPC or parceling mechanisms. These steps go beyond generic advice by focusing on controlling local access, application vetting, and proactive monitoring tailored to this vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-02-10T18:29:43.943Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9d3bf88499799243bc1bf

Added to database: 9/4/2025, 6:00:31 PM

Last enriched: 9/11/2025, 8:17:57 PM

Last updated: 10/18/2025, 4:37:27 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats