Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32347: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-32347cvecve-2025-32347
Published: Thu Sep 04 2025 (09/04/2025, 18:34:01 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In onStart of BiometricEnrollIntroduction.java, there is a possible way to determine the device's location due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:36:51 UTC

Technical Analysis

CVE-2025-32347 is a vulnerability identified in Google Android versions 13 through 16, specifically within the BiometricEnrollIntroduction.java component. The issue stems from an unsafe use of PendingIntent in the onStart method, which inadvertently exposes the device's location information. PendingIntent is a common Android mechanism that allows an application to pass a future intent to another application or system component. If improperly configured, it can be hijacked or misused to perform unauthorized actions. In this case, the unsafe PendingIntent allows a local attacker to escalate privileges without requiring additional execution privileges, meaning the attacker does not need to have elevated rights beforehand. However, user interaction is necessary to trigger the exploit, which limits remote exploitation but does not eliminate risk on compromised or socially engineered devices. The vulnerability is categorized under CWE-926 (Improper Handling of Permissions), indicating a failure to correctly manage access controls. The CVSS v3.1 base score is 7.8, reflecting high severity due to its impact on confidentiality (disclosure of location), integrity (potential unauthorized actions), and availability (possible disruption). Although no public exploits are known at this time, the vulnerability's presence in recent Android versions makes it a significant concern for device security and privacy.

Potential Impact

The vulnerability allows a local attacker to escalate privileges on affected Android devices, potentially gaining unauthorized access to sensitive location data. This breach of confidentiality can lead to privacy violations and targeted attacks. Integrity is also at risk since the attacker might manipulate biometric enrollment or related processes, potentially undermining device authentication mechanisms. Availability could be impacted if the exploit causes system instability or denial of service during biometric enrollment. Organizations relying on Android devices for secure authentication or sensitive operations may face increased risk of data leakage and unauthorized access. The requirement for user interaction reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks, especially in environments where users might be socially engineered. The lack of known exploits in the wild currently limits immediate risk but emphasizes the need for proactive mitigation. The vulnerability affects a broad range of Android versions, impacting a large global user base and enterprise deployments.

Mitigation Recommendations

Organizations should monitor for official patches from Google and apply them promptly once released. Until patches are available, restrict access to biometric enrollment features and educate users about the risks of interacting with unexpected prompts or requests related to biometric setup. Implement application whitelisting and privilege restrictions to limit the ability of local applications to invoke or manipulate PendingIntents associated with biometric enrollment. Employ mobile device management (MDM) solutions to enforce security policies and monitor for suspicious activity related to biometric enrollment processes. Developers should review and harden PendingIntent usage in their applications, ensuring they are immutable or explicitly specify target components to prevent hijacking. Regularly audit device configurations and permissions to minimize the attack surface. Additionally, consider disabling biometric enrollment temporarily in high-risk environments until a fix is applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-04-04T23:31:03.897Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9dcc588499799243c2f3c

Added to database: 9/4/2025, 6:39:01 PM

Last enriched: 2/27/2026, 1:36:51 AM

Last updated: 3/24/2026, 7:05:56 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses