Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32346: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-32346cvecve-2025-32346
Published: Thu Sep 04 2025 (09/04/2025, 18:34:00 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In onActivityResult of VoicemailSettingsActivity.java, there is a possible work profile contact number leak due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:36:32 UTC

Technical Analysis

CVE-2025-32346 is a vulnerability in Google Android 16, specifically within the onActivityResult method of the VoicemailSettingsActivity.java component. The flaw is classified as a confused deputy problem (CWE-441), where the application improperly handles permissions or authority, leading to unintended information disclosure. In this case, the vulnerability can cause leakage of work profile contact numbers, which are typically segregated for privacy and security reasons. The flaw allows a local attacker, without needing additional execution privileges or user interaction, to escalate their privileges on the device. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) indicates that the attack requires local access with low complexity, minimal privileges, and no user interaction, but results in high impact on confidentiality, integrity, and availability. This suggests that an attacker with limited access could gain significant control or access to sensitive data. The vulnerability is currently published but lacks an official patch or known exploits in the wild. The affected component is part of Android’s voicemail settings, which may be leveraged to bypass work profile isolation mechanisms, undermining enterprise security policies that rely on profile separation.

Potential Impact

The vulnerability poses a significant risk to organizations and individuals using Android 16 devices, especially those employing work profiles to separate personal and corporate data. Leakage of work profile contact numbers can expose sensitive corporate information, potentially leading to targeted social engineering or further attacks. The elevation of privilege aspect means attackers can gain unauthorized access to higher privilege levels, potentially compromising device integrity and availability. This could facilitate installation of malicious software, data exfiltration, or disruption of device functions. Enterprises relying on Android devices for secure communications and data segregation are particularly at risk, as this vulnerability undermines the security boundary between personal and work profiles. The lack of required user interaction increases the likelihood of exploitation in environments where local access is possible, such as shared devices or compromised endpoints.

Mitigation Recommendations

Until an official patch is released, organizations should enforce strict local device access controls, including strong authentication and device encryption to limit local attacker opportunities. Employ Mobile Device Management (MDM) solutions to monitor and restrict application permissions related to voicemail and contact access. Disable or restrict work profile features where feasible to reduce attack surface. Regularly audit device configurations and logs for suspicious activity related to voicemail settings or contact access. Educate users about the risks of local device access by untrusted parties. Once patches become available, prioritize immediate deployment on all affected Android 16 devices. Additionally, consider implementing runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions capable of detecting anomalous privilege escalation attempts on mobile devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-04-04T23:31:03.896Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9dcc588499799243c2f39

Added to database: 9/4/2025, 6:39:01 PM

Last enriched: 2/27/2026, 1:36:32 AM

Last updated: 3/25/2026, 1:42:42 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses