Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0025: Information disclosure in Google Android

0
Unknown
VulnerabilityCVE-2026-0025cvecve-2026-0025
Published: Mon Mar 02 2026 (03/02/2026, 18:42:47 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In hasImage of Notification.java, there is a possible way to reveal information across users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 03/02/2026, 19:05:56 UTC

Technical Analysis

CVE-2026-0025 is a vulnerability identified in the Android operating system, specifically within the hasImage method of the Notification.java component. This flaw results from a permissions bypass that allows information disclosure across different user profiles on the same device. The vulnerability affects Android versions 14, 15, 16, and 16-qpr2. Because the issue involves a permissions bypass, an attacker operating locally on the device can escalate privileges without needing additional execution rights or user interaction, which significantly lowers the barrier for exploitation. The vulnerability enables an attacker to access notification-related data that should be isolated between users, potentially exposing sensitive information such as notification content or metadata. While no public exploits have been reported yet, the flaw's nature suggests it could be leveraged by malicious applications or local adversaries to compromise confidentiality. The lack of a CVSS score indicates that the vulnerability is newly disclosed and pending detailed scoring, but the technical details imply a significant risk. The vulnerability is particularly critical in environments where devices are shared among multiple users or where sensitive notifications are displayed. The absence of user interaction requirement increases the threat level, as exploitation can occur silently. Google has not yet published patches or mitigations, so affected organizations must remain vigilant and prepare to deploy updates promptly once available.

Potential Impact

The primary impact of CVE-2026-0025 is unauthorized information disclosure across user boundaries on Android devices. This can lead to breaches of confidentiality, exposing sensitive notification data that may include personal, corporate, or security-related information. The vulnerability allows local privilege escalation without additional execution privileges or user interaction, increasing the risk that malicious apps or local attackers can silently exploit the flaw. Organizations using Android devices in multi-user scenarios, such as shared devices in enterprise or educational settings, face heightened risk. The exposure of notification content could facilitate further attacks, social engineering, or data leakage. Although availability and integrity impacts are minimal, the confidentiality breach alone can have severe consequences, including loss of trust, regulatory compliance violations, and potential lateral movement within compromised environments. The lack of known exploits in the wild currently limits immediate risk, but the vulnerability's characteristics make it a likely target for future exploitation. The broad range of affected Android versions means a large number of devices worldwide are potentially vulnerable, amplifying the global impact.

Mitigation Recommendations

To mitigate CVE-2026-0025, organizations and users should: 1) Monitor official Google security advisories and promptly apply patches or security updates once released for affected Android versions (14 through 16-qpr2). 2) Restrict installation of untrusted or unnecessary applications, especially those requesting notification access or elevated permissions, to reduce the attack surface. 3) Implement strict app permission policies using Mobile Device Management (MDM) solutions to control which apps can access notification data or run with elevated privileges. 4) For multi-user devices, enforce user separation policies and consider disabling multi-user features if not required to limit cross-user data exposure. 5) Conduct regular security audits and monitoring on Android devices to detect suspicious local activity or privilege escalations. 6) Educate users about the risks of installing apps from unknown sources and the importance of keeping devices updated. 7) Employ endpoint detection and response (EDR) tools capable of monitoring Android environments for anomalous behavior indicative of exploitation attempts. These steps go beyond generic advice by focusing on controlling permissions, user configurations, and proactive monitoring tailored to the vulnerability's characteristics.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-10-15T15:39:03.800Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a5db82d1a09e29cb1cf01b

Added to database: 3/2/2026, 6:48:34 PM

Last enriched: 3/2/2026, 7:05:56 PM

Last updated: 3/3/2026, 4:38:13 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses