CVE-2025-0083
📋 TL;DR
This CVE-2025-0083 vulnerability allows unauthorized access to content across user profiles on Android devices due to URI double encoding. It enables local information disclosure without requiring additional privileges or user interaction. This affects Android devices with vulnerable versions of the framework and Telecomm services.
💻 Affected Systems
- Android Framework
- Android Telecomm Services
📦 What is this software?
Android by Google
Android by Google
Android by Google
Android by Google
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
An attacker could access sensitive data from other user profiles on a shared device, potentially exposing personal information, messages, or files across profile boundaries.
Likely Case
Limited information disclosure between user profiles on multi-user Android devices, potentially exposing some app data or cached content.
If Mitigated
With proper Android security updates applied, the vulnerability is completely patched with no residual risk.
🎯 Exploit Status
Exploitation requires local access to the device and knowledge of URI double encoding techniques. No user interaction needed for successful exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: March 2025 Android Security Update
Vendor Advisory: https://source.android.com/security/bulletin/2025-03-01
Restart Required: No
Instructions:
1. Check for Android system updates in Settings > System > System update. 2. Apply the March 2025 security update. 3. Verify the update installed successfully by checking Android version and security patch level.
🔧 Temporary Workarounds
Disable Multiple User Profiles
AndroidRemove or disable additional user profiles on the device to eliminate the cross-profile attack vector.
Settings > System > Multiple users > Remove additional users
🧯 If You Can't Patch
- Restrict physical access to devices and implement strong device access controls
- Use Android Enterprise or MDM solutions to enforce security policies and isolate sensitive data
🔍 How to Verify
Check if Vulnerable:
Check Settings > About phone > Android security patch level. If earlier than March 2025, the device is vulnerable.
Check Version:
adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify Android security patch level shows March 2025 or later in Settings > About phone.
📡 Detection & Monitoring
Log Indicators:
- Unusual cross-profile URI access attempts in Android system logs
- Security exceptions related to URI parsing in framework logs
Network Indicators:
- No network indicators - this is a local vulnerability
SIEM Query:
No applicable network SIEM query - monitor for Android security patch compliance instead