What is the Pixnapping vulnerability, and how to protect your Android smartphone? | Kaspersky official blog
The Android vulnerability CVE-2025-48561 (Pixnapping) enables the theft of any data displayed on a smartphone's screen. We explain how Pixnapping works and give advice on mitigating the risk.
AI Analysis
Technical Summary
Pixnapping is a sophisticated Android vulnerability (CVE-2025-48561) discovered by researchers that enables an attacker to capture screen content from other apps without requiring any special permissions. The attack exploits fundamental Android features: the ability to send Intents to launch or manipulate apps and to render app windows. The malicious app sends a crafted Intent to a target app, forcing it to render sensitive information in a hidden window that is not visible to the user. The attacker then overlays this hidden window with multiple translucent windows, each designed to blur and isolate specific pixels. Because Android only allows apps to read pixels from their own windows, the attacker uses a combination of a mostly opaque window with a single transparent pixel and a magnifying blurred window on top to isolate individual pixels from the victim app’s content. To decode the pixel values, the attacker leverages a GPU timing side channel vulnerability known as GPU.zip, which measures the time taken to compress image data sent from the CPU to the GPU. This timing varies depending on the pixel data, allowing the attacker to infer the pixel color values. By repeating this process hundreds of times, the attacker reconstructs meaningful screen content such as one-time authentication codes, passwords, and financial data. The attack was demonstrated on Android versions 13 to 16 on Google Pixel 6–9 and Samsung Galaxy S25 devices, and is believed to affect all modern Android smartphones due to reliance on standard Android and GPU mechanisms. Android’s existing protections—such as FLAG_SECURE, media projection restrictions, and app sandboxing—are bypassed because the attack requires no special permissions and uses only basic Android capabilities. Google issued a patch in September 2025, but it was insufficient and quickly bypassed; a more robust fix is planned for December 2025. No patch is planned for the GPU.zip side channel itself, as it is a hardware-level timing leak inherent to GPU compression. Currently, no active exploitation in the wild is known, but the vulnerability poses a significant risk if weaponized. Users are advised to keep devices updated, avoid installing untrusted apps, and use comprehensive mobile security solutions.
Potential Impact
For European organizations, Pixnapping presents a serious threat to the confidentiality of sensitive information accessed on Android devices. Employees using vulnerable smartphones could have passwords, multi-factor authentication codes, banking details, and corporate secrets stolen silently by malicious apps without any permissions or user awareness. This could lead to unauthorized access to corporate networks, financial fraud, identity theft, and compromise of critical business systems. The attack’s stealthy nature and lack of required permissions make detection difficult, increasing the risk of prolonged undetected breaches. Organizations relying heavily on Android devices for secure communications, remote access, or mobile banking are particularly at risk. The potential for credential theft could undermine multi-factor authentication protections, weakening overall security posture. Additionally, the inability to fully mitigate the GPU.zip side channel at the hardware level means the vulnerability may persist even after software patches, requiring ongoing vigilance. The attack could also facilitate espionage or targeted attacks against high-value individuals or sectors within Europe, such as finance, government, and critical infrastructure. Although no active exploits are reported, the demonstrated feasibility and short time to extract sensitive data (e.g., 22 seconds for a 6-digit code) underscore the urgency of addressing this threat.
Mitigation Recommendations
1. Ensure all Android devices are promptly updated to the latest OS version with the December 2025 security patch from Google, which aims to more effectively fix Pixnapping. 2. Deploy enterprise mobile device management (MDM) solutions to enforce update policies and restrict installation of untrusted or new apps with low reputation. 3. Educate employees to avoid installing apps from unofficial sources and to scrutinize app permissions and developer reputations, especially for new or low-download apps. 4. Use advanced mobile security software capable of detecting suspicious app behaviors, including unusual window overlay patterns or Intent abuse. 5. Limit use of sensitive apps on mobile devices where possible, or employ app-level protections such as FLAG_SECURE and custom screen obfuscation techniques to reduce exposure. 6. Monitor device logs and network traffic for anomalies that may indicate covert data exfiltration. 7. Encourage use of hardware-based multi-factor authentication tokens or biometric methods that do not rely solely on screen-displayed codes. 8. For high-risk users, consider restricting Android device usage or employing virtualized environments that isolate sensitive app rendering. 9. Collaborate with device manufacturers and Google to track patch deployment and vulnerability status. 10. Maintain awareness of emerging research on GPU.zip side channel mitigations and consider hardware upgrades when feasible.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
What is the Pixnapping vulnerability, and how to protect your Android smartphone? | Kaspersky official blog
Description
The Android vulnerability CVE-2025-48561 (Pixnapping) enables the theft of any data displayed on a smartphone's screen. We explain how Pixnapping works and give advice on mitigating the risk.
AI-Powered Analysis
Technical Analysis
Pixnapping is a sophisticated Android vulnerability (CVE-2025-48561) discovered by researchers that enables an attacker to capture screen content from other apps without requiring any special permissions. The attack exploits fundamental Android features: the ability to send Intents to launch or manipulate apps and to render app windows. The malicious app sends a crafted Intent to a target app, forcing it to render sensitive information in a hidden window that is not visible to the user. The attacker then overlays this hidden window with multiple translucent windows, each designed to blur and isolate specific pixels. Because Android only allows apps to read pixels from their own windows, the attacker uses a combination of a mostly opaque window with a single transparent pixel and a magnifying blurred window on top to isolate individual pixels from the victim app’s content. To decode the pixel values, the attacker leverages a GPU timing side channel vulnerability known as GPU.zip, which measures the time taken to compress image data sent from the CPU to the GPU. This timing varies depending on the pixel data, allowing the attacker to infer the pixel color values. By repeating this process hundreds of times, the attacker reconstructs meaningful screen content such as one-time authentication codes, passwords, and financial data. The attack was demonstrated on Android versions 13 to 16 on Google Pixel 6–9 and Samsung Galaxy S25 devices, and is believed to affect all modern Android smartphones due to reliance on standard Android and GPU mechanisms. Android’s existing protections—such as FLAG_SECURE, media projection restrictions, and app sandboxing—are bypassed because the attack requires no special permissions and uses only basic Android capabilities. Google issued a patch in September 2025, but it was insufficient and quickly bypassed; a more robust fix is planned for December 2025. No patch is planned for the GPU.zip side channel itself, as it is a hardware-level timing leak inherent to GPU compression. Currently, no active exploitation in the wild is known, but the vulnerability poses a significant risk if weaponized. Users are advised to keep devices updated, avoid installing untrusted apps, and use comprehensive mobile security solutions.
Potential Impact
For European organizations, Pixnapping presents a serious threat to the confidentiality of sensitive information accessed on Android devices. Employees using vulnerable smartphones could have passwords, multi-factor authentication codes, banking details, and corporate secrets stolen silently by malicious apps without any permissions or user awareness. This could lead to unauthorized access to corporate networks, financial fraud, identity theft, and compromise of critical business systems. The attack’s stealthy nature and lack of required permissions make detection difficult, increasing the risk of prolonged undetected breaches. Organizations relying heavily on Android devices for secure communications, remote access, or mobile banking are particularly at risk. The potential for credential theft could undermine multi-factor authentication protections, weakening overall security posture. Additionally, the inability to fully mitigate the GPU.zip side channel at the hardware level means the vulnerability may persist even after software patches, requiring ongoing vigilance. The attack could also facilitate espionage or targeted attacks against high-value individuals or sectors within Europe, such as finance, government, and critical infrastructure. Although no active exploits are reported, the demonstrated feasibility and short time to extract sensitive data (e.g., 22 seconds for a 6-digit code) underscore the urgency of addressing this threat.
Mitigation Recommendations
1. Ensure all Android devices are promptly updated to the latest OS version with the December 2025 security patch from Google, which aims to more effectively fix Pixnapping. 2. Deploy enterprise mobile device management (MDM) solutions to enforce update policies and restrict installation of untrusted or new apps with low reputation. 3. Educate employees to avoid installing apps from unofficial sources and to scrutinize app permissions and developer reputations, especially for new or low-download apps. 4. Use advanced mobile security software capable of detecting suspicious app behaviors, including unusual window overlay patterns or Intent abuse. 5. Limit use of sensitive apps on mobile devices where possible, or employ app-level protections such as FLAG_SECURE and custom screen obfuscation techniques to reduce exposure. 6. Monitor device logs and network traffic for anomalies that may indicate covert data exfiltration. 7. Encourage use of hardware-based multi-factor authentication tokens or biometric methods that do not rely solely on screen-displayed codes. 8. For high-risk users, consider restricting Android device usage or employing virtualized environments that isolate sensitive app rendering. 9. Collaborate with device manufacturers and Google to track patch deployment and vulnerability status. 10. Maintain awareness of emerging research on GPU.zip side channel mitigations and consider hardware upgrades when feasible.
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/pixnapping-cve-2025-48561/54756/","fetched":true,"fetchedAt":"2025-11-11T16:37:05.579Z","wordCount":1845}
Threat ID: 69136631f922b639ab601387
Added to database: 11/11/2025, 4:37:05 PM
Last enriched: 12/2/2025, 9:51:37 PM
Last updated: 1/7/2026, 8:50:23 AM
Views: 121
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumCVE-2025-13529: CWE-862 Missing Authorization in codeclouds Unify
MediumCVE-2025-13527: CWE-352 Cross-Site Request Forgery (CSRF) in anwerashif xShare
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.