CVE-2025-32347: Elevation of privilege in Google Android
In onStart of BiometricEnrollIntroduction.java, there is a possible way to determine the device's location due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
AI Analysis
Technical Summary
CVE-2025-32347 is a high-severity elevation of privilege vulnerability affecting Google Android versions 13 through 16. The flaw resides in the onStart method of the BiometricEnrollIntroduction.java component, where an unsafe PendingIntent implementation allows an attacker to potentially determine the device's location. This vulnerability is classified under CWE-926, which involves improper control of a resource through a dangerous reference, in this case, the PendingIntent. Exploitation requires local access and user interaction but does not need additional execution privileges, meaning an attacker with limited permissions could leverage this flaw to escalate their privileges on the device. The vulnerability impacts confidentiality, integrity, and availability, as indicated by the CVSS vector (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), highlighting that the attacker can gain high impact on all three security properties. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a significant risk, especially given the widespread use of Android devices. The unsafe PendingIntent could allow attackers to intercept or manipulate intents, potentially leaking sensitive location information and enabling further malicious actions on the device.
Potential Impact
For European organizations, this vulnerability poses a considerable risk, particularly for enterprises relying on Android devices for secure communications, authentication, or handling sensitive data. The ability to escalate privileges locally could allow attackers to bypass security controls, access confidential information, or disrupt device availability. This is especially critical for sectors such as finance, healthcare, and government, where data protection is paramount under regulations like GDPR. The location leakage aspect could also lead to privacy violations, undermining user trust and compliance with privacy laws. Furthermore, since user interaction is required, phishing or social engineering campaigns could be used to trigger exploitation, increasing the attack surface. The impact extends to mobile device management (MDM) environments where compromised devices could serve as entry points into corporate networks.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating affected Android devices to patched versions once available from Google or device manufacturers. In the interim, organizations should enforce strict application control policies to limit installation of untrusted apps that could exploit this vulnerability. Employing mobile threat defense solutions that detect suspicious local privilege escalation attempts can provide additional protection. User awareness training should emphasize the risks of interacting with untrusted prompts or applications, reducing the likelihood of successful exploitation requiring user interaction. Organizations should also review and tighten PendingIntent usage in custom applications to avoid similar unsafe implementations. For sensitive environments, consider restricting device features related to biometric enrollment or location services until patches are applied. Regular audits of device security posture and compliance with mobile security best practices will further reduce risk.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Ireland
CVE-2025-32347: Elevation of privilege in Google Android
Description
In onStart of BiometricEnrollIntroduction.java, there is a possible way to determine the device's location due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2025-32347 is a high-severity elevation of privilege vulnerability affecting Google Android versions 13 through 16. The flaw resides in the onStart method of the BiometricEnrollIntroduction.java component, where an unsafe PendingIntent implementation allows an attacker to potentially determine the device's location. This vulnerability is classified under CWE-926, which involves improper control of a resource through a dangerous reference, in this case, the PendingIntent. Exploitation requires local access and user interaction but does not need additional execution privileges, meaning an attacker with limited permissions could leverage this flaw to escalate their privileges on the device. The vulnerability impacts confidentiality, integrity, and availability, as indicated by the CVSS vector (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), highlighting that the attacker can gain high impact on all three security properties. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a significant risk, especially given the widespread use of Android devices. The unsafe PendingIntent could allow attackers to intercept or manipulate intents, potentially leaking sensitive location information and enabling further malicious actions on the device.
Potential Impact
For European organizations, this vulnerability poses a considerable risk, particularly for enterprises relying on Android devices for secure communications, authentication, or handling sensitive data. The ability to escalate privileges locally could allow attackers to bypass security controls, access confidential information, or disrupt device availability. This is especially critical for sectors such as finance, healthcare, and government, where data protection is paramount under regulations like GDPR. The location leakage aspect could also lead to privacy violations, undermining user trust and compliance with privacy laws. Furthermore, since user interaction is required, phishing or social engineering campaigns could be used to trigger exploitation, increasing the attack surface. The impact extends to mobile device management (MDM) environments where compromised devices could serve as entry points into corporate networks.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating affected Android devices to patched versions once available from Google or device manufacturers. In the interim, organizations should enforce strict application control policies to limit installation of untrusted apps that could exploit this vulnerability. Employing mobile threat defense solutions that detect suspicious local privilege escalation attempts can provide additional protection. User awareness training should emphasize the risks of interacting with untrusted prompts or applications, reducing the likelihood of successful exploitation requiring user interaction. Organizations should also review and tighten PendingIntent usage in custom applications to avoid similar unsafe implementations. For sensitive environments, consider restricting device features related to biometric enrollment or location services until patches are applied. Regular audits of device security posture and compliance with mobile security best practices will further reduce risk.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- google_android
- Date Reserved
- 2025-04-04T23:31:03.897Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b9dcc588499799243c2f3c
Added to database: 9/4/2025, 6:39:01 PM
Last enriched: 9/11/2025, 8:11:14 PM
Last updated: 10/16/2025, 7:30:57 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61553: n/a
CriticalCVE-2025-11853: Improper Access Controls in Sismics Teedy
MediumCVE-2025-11852: Missing Authentication in Apeman ID71
MediumCVE-2025-11493: CWE-494 Download of Code Without Integrity Check in ConnectWise Automate
HighCVE-2025-11492: CWE-319 Cleartext Transmission of Sensitive Information in ConnectWise Automate
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.