CVE-2025-0082

5.5 MEDIUM

📋 TL;DR

This Android vulnerability allows one user's images to be accessed by another user through confused deputy attacks in StatusHint.java and TelecomServiceImpl.java. It requires user interaction for exploitation and leads to local information disclosure without elevated privileges. Affects Android devices with vulnerable versions of the telephony framework.

💻 Affected Systems

Products:
  • Android operating system
Versions: Android versions prior to March 2025 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with multiple user profiles enabled. Single-user devices are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could access sensitive images from other user profiles on a shared device, potentially exposing personal photos, documents, or screenshots.

🟠

Likely Case

Limited information leakage between user profiles on multi-user Android devices, potentially exposing non-sensitive images.

🟢

If Mitigated

With proper user separation and updated software, risk is minimal as the vulnerability requires user interaction and only affects local information.

🌐 Internet-Facing: LOW - This is a local vulnerability that doesn't directly expose systems to internet-based attacks.
🏢 Internal Only: MEDIUM - On shared Android devices, this could allow unauthorized access to images between user profiles.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction and knowledge of confused deputy techniques. No known public exploits as of March 2025.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android March 2025 security patch or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-03-01

Restart Required: No

Instructions:

1. Check for system updates in Settings > System > System update. 2. Install March 2025 Android security patch. 3. Verify patch installation in Settings > About phone > Android security patch level.

🔧 Temporary Workarounds

Disable multi-user profiles

Android

Remove additional user profiles to eliminate the attack surface

Settings > System > Multiple users > Remove additional users

🧯 If You Can't Patch

  • Restrict device to single-user mode only
  • Implement strict access controls and monitor for suspicious activity between user profiles

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android security patch level. If earlier than March 2025, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows March 2025 or later in Settings > About phone > Android security patch level.

📡 Detection & Monitoring

Log Indicators:

  • Unusual cross-user file access attempts in telephony service logs
  • Permission violations in StatusHint or TelecomServiceImpl components

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

source="android_system" AND (component="StatusHint" OR component="TelecomServiceImpl") AND event="permission_violation"

🔗 References

📤 Share & Export