Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32329: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-32329cvecve-2025-32329
Published: Mon Dec 08 2025 (12/08/2025, 16:56:59 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In multiple functions of Session.java, there is a possible way to view images belonging to a different user of the device due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:02:32 UTC

Technical Analysis

CVE-2025-32329 is a logic error vulnerability found in multiple functions of the Session.java component within Google Android versions 13, 14, and 15. The flaw allows a local attacker to bypass user boundaries and access images belonging to other users on the same device. This occurs due to improper handling of user session data, which leads to unauthorized access to private media files. The vulnerability does not require the attacker to have any additional execution privileges beyond local access, nor does it require any user interaction, making it easier to exploit in multi-user environments or devices shared among multiple profiles. The CVSS v3.1 base score is 7.8, reflecting high severity with impacts on confidentiality, integrity, and availability. The attack vector is local, with low attack complexity and low privileges required, and no user interaction needed. Although no exploits have been reported in the wild yet, the vulnerability represents a serious risk to user privacy and device security. The flaw could be leveraged to escalate privileges locally, potentially enabling further malicious actions. The vulnerability affects a broad range of Android devices running versions 13 through 15, which are widely deployed globally. Since the vulnerability is rooted in core session management code, it may affect many device manufacturers using these Android versions. No official patches or mitigation links are currently provided, but Google is expected to release updates addressing this issue.

Potential Impact

The primary impact of CVE-2025-32329 is unauthorized access to private images of other users on the same Android device, violating confidentiality. This can lead to privacy breaches, data leakage, and potential misuse of sensitive media. The elevation of privilege aspect means an attacker with local access can gain higher privileges than intended, potentially allowing further compromise of the device. Integrity is also at risk if the attacker modifies or deletes images belonging to other users. Availability could be affected if the attacker disrupts access to user data or causes system instability. Organizations relying on Android devices for sensitive operations or storing confidential information face increased risk of insider threats or malicious local users exploiting this vulnerability. The lack of required user interaction and low complexity of exploitation increase the likelihood of successful attacks in shared device scenarios, such as corporate or family environments. The widespread use of affected Android versions globally amplifies the potential impact, especially in regions with high smartphone penetration and multi-user device usage.

Mitigation Recommendations

1. Apply official security patches from Google as soon as they become available for Android versions 13, 14, and 15. 2. Enforce strict local device access controls, including strong authentication mechanisms (PIN, password, biometrics) to prevent unauthorized local access. 3. Limit the number of users and profiles on shared devices to reduce exposure. 4. Use device management solutions to monitor and restrict local user activities where feasible. 5. Educate users about the risks of sharing devices and the importance of separate user profiles with appropriate permissions. 6. Temporarily disable or restrict access to sensitive media files for secondary users until patches are applied. 7. Monitor device logs for unusual access patterns or privilege escalations. 8. For organizations, consider deploying endpoint detection and response (EDR) tools capable of detecting local privilege escalation attempts. 9. Encourage users to keep their devices updated regularly and avoid installing untrusted applications that could facilitate local attacks. 10. If possible, isolate sensitive workloads or data on dedicated devices not shared among multiple users.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-04-04T23:30:30.732Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6937057e52c2eb5957f2e585

Added to database: 12/8/2025, 5:06:06 PM

Last enriched: 2/27/2026, 5:02:32 AM

Last updated: 3/25/2026, 3:00:40 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses