CVE-2025-22419

7.3 HIGH

📋 TL;DR

This CVE describes a tapjacking/overlay vulnerability in Android's Telephony service that could trick users into enabling malicious call forwarding. Attackers can overlay deceptive UI elements on legitimate system dialogs to intercept user taps. This affects Android devices with vulnerable Telephony service versions.

💻 Affected Systems

Products:
  • Android Telephony Service
Versions: Android versions prior to the April 2025 security update
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction - users must be tricked into tapping on malicious overlays. Exploitation requires a malicious app to be installed with overlay permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could redirect all incoming calls to malicious numbers, enabling call interception, social engineering attacks, or bypassing two-factor authentication via phone calls.

🟠

Likely Case

Targeted attacks against specific users to redirect their calls, potentially leading to privacy violations or account takeover via intercepted authentication calls.

🟢

If Mitigated

With proper Android security updates and user awareness, the risk is limited to devices that haven't been patched or where users ignore security warnings.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires developing a malicious app with overlay permissions and social engineering to trick users. The vulnerability is documented in Android security bulletins.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Update April 2025 or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-04-01

Restart Required: Yes

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Install the April 2025 security update or later. 3. Restart the device after installation.

🔧 Temporary Workarounds

Disable overlay permissions for untrusted apps

android

Prevent apps from drawing over other apps, which is required for this attack

Settings > Apps & notifications > Special app access > Display over other apps > Disable for untrusted apps

Review and restrict app permissions

android

Regularly audit which apps have overlay permissions and remove unnecessary ones

Settings > Apps & notifications > [App name] > Permissions > Display over other apps > Deny

🧯 If You Can't Patch

  • Educate users about tapjacking risks and to be cautious when interacting with system dialogs
  • Implement mobile device management (MDM) policies to restrict overlay permissions for all apps

🔍 How to Verify

Check if Vulnerable:

Check Android build date in Settings > About phone > Android version. If build date is before April 2025, device is likely vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify the security patch level shows April 2025 or later in Settings > About phone > Android version > Android security update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual call forwarding settings changes
  • Multiple failed attempts to modify call settings
  • Apps requesting overlay permissions unexpectedly

Network Indicators:

  • Unexpected call forwarding to unfamiliar numbers
  • Call routing patterns that bypass normal carrier settings

SIEM Query:

android.security_event:("call_forwarding" OR "overlay_permission") AND action:modified

🔗 References

📤 Share & Export