Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32346: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-32346cvecve-2025-32346
Published: Thu Sep 04 2025 (09/04/2025, 18:34:00 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In onActivityResult of VoicemailSettingsActivity.java, there is a possible work profile contact number leak due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/11/2025, 20:11:05 UTC

Technical Analysis

CVE-2025-32346 is a high-severity elevation of privilege vulnerability affecting Google Android version 16. The flaw exists in the onActivityResult method of the VoicemailSettingsActivity.java component. Specifically, it involves a confused deputy problem where a work profile contact number may be leaked improperly. This leakage can be exploited locally to escalate privileges without requiring any additional execution privileges or user interaction. The vulnerability is classified under CWE-441, which relates to incorrect handling of sensitive data leading to information leaks. The CVSS v3.1 base score is 7.8, indicating a high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits are currently in the wild and no patches have been linked yet, the vulnerability allows an attacker with limited local access to gain elevated privileges by exploiting the confused deputy issue in the voicemail settings activity. This could lead to unauthorized access to sensitive work profile contact information and potentially further compromise of the device or data.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in environments where Android devices are used to separate personal and work profiles, such as in BYOD (Bring Your Own Device) scenarios or corporate mobile device management. The leakage of work profile contact numbers could expose sensitive corporate contact information, facilitating social engineering or targeted attacks. The elevation of privilege could allow attackers to bypass security controls, access restricted data, or install malicious software, undermining device integrity and confidentiality. Given the high impact on confidentiality, integrity, and availability, this vulnerability could disrupt business operations, lead to data breaches, and damage organizational reputation. The lack of required user interaction increases the risk of stealthy exploitation, making it a critical concern for organizations relying on Android devices for secure communications and data handling.

Mitigation Recommendations

Organizations should prioritize updating affected Android devices to patched versions as soon as they become available from Google or device manufacturers. Until patches are released, applying strict mobile device management (MDM) policies to limit local access and enforce least privilege principles can reduce risk. Disabling or restricting the use of voicemail settings or work profile features on vulnerable devices may mitigate exposure. Monitoring device logs for unusual activity related to voicemail or profile settings can help detect exploitation attempts. Additionally, educating users about the risks of local privilege escalation and encouraging the use of strong device locks and encryption can further reduce attack surface. Enterprises should also consider isolating sensitive work profiles from less secure personal profiles and regularly auditing device configurations to ensure compliance with security policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-04-04T23:31:03.896Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9dcc588499799243c2f39

Added to database: 9/4/2025, 6:39:01 PM

Last enriched: 9/11/2025, 8:11:05 PM

Last updated: 10/16/2025, 7:34:05 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats