CVE-2025-0083

4.0 MEDIUM

📋 TL;DR

This CVE-2025-0083 vulnerability allows unauthorized access to content across user profiles on Android devices due to URI double encoding. It enables local information disclosure without requiring additional privileges or user interaction. This affects Android devices with vulnerable versions of the framework and Telecomm services.

💻 Affected Systems

Products:
  • Android Framework
  • Android Telecomm Services
Versions: Android versions prior to March 2025 security updates
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Android devices with multiple user profiles enabled. Single-user devices are not vulnerable to cross-profile attacks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could access sensitive data from other user profiles on a shared device, potentially exposing personal information, messages, or files across profile boundaries.

🟠

Likely Case

Limited information disclosure between user profiles on multi-user Android devices, potentially exposing some app data or cached content.

🟢

If Mitigated

With proper Android security updates applied, the vulnerability is completely patched with no residual risk.

🌐 Internet-Facing: LOW - This is a local vulnerability that requires physical or local access to the device, not exploitable over the internet.
🏢 Internal Only: MEDIUM - On shared Android devices with multiple user profiles, this could allow unauthorized cross-profile data access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the device and knowledge of URI double encoding techniques. No user interaction needed for successful exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: March 2025 Android Security Update

Vendor Advisory: https://source.android.com/security/bulletin/2025-03-01

Restart Required: No

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Apply the March 2025 security update. 3. Verify the update installed successfully by checking Android version and security patch level.

🔧 Temporary Workarounds

Disable Multiple User Profiles

Android

Remove or disable additional user profiles on the device to eliminate the cross-profile attack vector.

Settings > System > Multiple users > Remove additional users

🧯 If You Can't Patch

  • Restrict physical access to devices and implement strong device access controls
  • Use Android Enterprise or MDM solutions to enforce security policies and isolate sensitive data

🔍 How to Verify

Check if Vulnerable:

Check Settings > About phone > Android security patch level. If earlier than March 2025, the device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows March 2025 or later in Settings > About phone.

📡 Detection & Monitoring

Log Indicators:

  • Unusual cross-profile URI access attempts in Android system logs
  • Security exceptions related to URI parsing in framework logs

Network Indicators:

  • No network indicators - this is a local vulnerability

SIEM Query:

No applicable network SIEM query - monitor for Android security patch compliance instead

🔗 References

📤 Share & Export