CVE-2025-32347: Elevation of privilege in Google Android
In onStart of BiometricEnrollIntroduction.java, there is a possible way to determine the device's location due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
AI Analysis
Technical Summary
CVE-2025-32347 is a vulnerability identified in Google Android versions 13 through 16, specifically within the BiometricEnrollIntroduction.java component. The issue stems from an unsafe use of PendingIntent in the onStart method, which inadvertently exposes the device's location information. PendingIntent is a common Android mechanism that allows an application to pass a future intent to another application or system component. If improperly configured, it can be hijacked or misused to perform unauthorized actions. In this case, the unsafe PendingIntent allows a local attacker to escalate privileges without requiring additional execution privileges, meaning the attacker does not need to have elevated rights beforehand. However, user interaction is necessary to trigger the exploit, which limits remote exploitation but does not eliminate risk on compromised or socially engineered devices. The vulnerability is categorized under CWE-926 (Improper Handling of Permissions), indicating a failure to correctly manage access controls. The CVSS v3.1 base score is 7.8, reflecting high severity due to its impact on confidentiality (disclosure of location), integrity (potential unauthorized actions), and availability (possible disruption). Although no public exploits are known at this time, the vulnerability's presence in recent Android versions makes it a significant concern for device security and privacy.
Potential Impact
The vulnerability allows a local attacker to escalate privileges on affected Android devices, potentially gaining unauthorized access to sensitive location data. This breach of confidentiality can lead to privacy violations and targeted attacks. Integrity is also at risk since the attacker might manipulate biometric enrollment or related processes, potentially undermining device authentication mechanisms. Availability could be impacted if the exploit causes system instability or denial of service during biometric enrollment. Organizations relying on Android devices for secure authentication or sensitive operations may face increased risk of data leakage and unauthorized access. The requirement for user interaction reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks, especially in environments where users might be socially engineered. The lack of known exploits in the wild currently limits immediate risk but emphasizes the need for proactive mitigation. The vulnerability affects a broad range of Android versions, impacting a large global user base and enterprise deployments.
Mitigation Recommendations
Organizations should monitor for official patches from Google and apply them promptly once released. Until patches are available, restrict access to biometric enrollment features and educate users about the risks of interacting with unexpected prompts or requests related to biometric setup. Implement application whitelisting and privilege restrictions to limit the ability of local applications to invoke or manipulate PendingIntents associated with biometric enrollment. Employ mobile device management (MDM) solutions to enforce security policies and monitor for suspicious activity related to biometric enrollment processes. Developers should review and harden PendingIntent usage in their applications, ensuring they are immutable or explicitly specify target components to prevent hijacking. Regularly audit device configurations and permissions to minimize the attack surface. Additionally, consider disabling biometric enrollment temporarily in high-risk environments until a fix is applied.
Affected Countries
United States, India, Brazil, Indonesia, Russia, Germany, United Kingdom, France, Japan, South Korea, Mexico, Nigeria, Turkey, Vietnam, Egypt
CVE-2025-32347: Elevation of privilege in Google Android
Description
In onStart of BiometricEnrollIntroduction.java, there is a possible way to determine the device's location due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-32347 is a vulnerability identified in Google Android versions 13 through 16, specifically within the BiometricEnrollIntroduction.java component. The issue stems from an unsafe use of PendingIntent in the onStart method, which inadvertently exposes the device's location information. PendingIntent is a common Android mechanism that allows an application to pass a future intent to another application or system component. If improperly configured, it can be hijacked or misused to perform unauthorized actions. In this case, the unsafe PendingIntent allows a local attacker to escalate privileges without requiring additional execution privileges, meaning the attacker does not need to have elevated rights beforehand. However, user interaction is necessary to trigger the exploit, which limits remote exploitation but does not eliminate risk on compromised or socially engineered devices. The vulnerability is categorized under CWE-926 (Improper Handling of Permissions), indicating a failure to correctly manage access controls. The CVSS v3.1 base score is 7.8, reflecting high severity due to its impact on confidentiality (disclosure of location), integrity (potential unauthorized actions), and availability (possible disruption). Although no public exploits are known at this time, the vulnerability's presence in recent Android versions makes it a significant concern for device security and privacy.
Potential Impact
The vulnerability allows a local attacker to escalate privileges on affected Android devices, potentially gaining unauthorized access to sensitive location data. This breach of confidentiality can lead to privacy violations and targeted attacks. Integrity is also at risk since the attacker might manipulate biometric enrollment or related processes, potentially undermining device authentication mechanisms. Availability could be impacted if the exploit causes system instability or denial of service during biometric enrollment. Organizations relying on Android devices for secure authentication or sensitive operations may face increased risk of data leakage and unauthorized access. The requirement for user interaction reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks, especially in environments where users might be socially engineered. The lack of known exploits in the wild currently limits immediate risk but emphasizes the need for proactive mitigation. The vulnerability affects a broad range of Android versions, impacting a large global user base and enterprise deployments.
Mitigation Recommendations
Organizations should monitor for official patches from Google and apply them promptly once released. Until patches are available, restrict access to biometric enrollment features and educate users about the risks of interacting with unexpected prompts or requests related to biometric setup. Implement application whitelisting and privilege restrictions to limit the ability of local applications to invoke or manipulate PendingIntents associated with biometric enrollment. Employ mobile device management (MDM) solutions to enforce security policies and monitor for suspicious activity related to biometric enrollment processes. Developers should review and harden PendingIntent usage in their applications, ensuring they are immutable or explicitly specify target components to prevent hijacking. Regularly audit device configurations and permissions to minimize the attack surface. Additionally, consider disabling biometric enrollment temporarily in high-risk environments until a fix is applied.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- google_android
- Date Reserved
- 2025-04-04T23:31:03.897Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b9dcc588499799243c2f3c
Added to database: 9/4/2025, 6:39:01 PM
Last enriched: 2/27/2026, 1:36:51 AM
Last updated: 3/24/2026, 7:05:56 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.