CVE-2025-22419
📋 TL;DR
This CVE describes a tapjacking/overlay vulnerability in Android's Telephony service that could trick users into enabling malicious call forwarding. Attackers can overlay deceptive UI elements on legitimate system dialogs to intercept user taps. This affects Android devices with vulnerable Telephony service versions.
💻 Affected Systems
- Android Telephony Service
📦 What is this software?
Android by Google
Android by Google
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
Attackers could redirect all incoming calls to malicious numbers, enabling call interception, social engineering attacks, or bypassing two-factor authentication via phone calls.
Likely Case
Targeted attacks against specific users to redirect their calls, potentially leading to privacy violations or account takeover via intercepted authentication calls.
If Mitigated
With proper Android security updates and user awareness, the risk is limited to devices that haven't been patched or where users ignore security warnings.
🎯 Exploit Status
Exploitation requires developing a malicious app with overlay permissions and social engineering to trick users. The vulnerability is documented in Android security bulletins.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Android Security Update April 2025 or later
Vendor Advisory: https://source.android.com/security/bulletin/2025-04-01
Restart Required: Yes
Instructions:
1. Check for Android system updates in Settings > System > System update. 2. Install the April 2025 security update or later. 3. Restart the device after installation.
🔧 Temporary Workarounds
Disable overlay permissions for untrusted apps
androidPrevent apps from drawing over other apps, which is required for this attack
Settings > Apps & notifications > Special app access > Display over other apps > Disable for untrusted apps
Review and restrict app permissions
androidRegularly audit which apps have overlay permissions and remove unnecessary ones
Settings > Apps & notifications > [App name] > Permissions > Display over other apps > Deny
🧯 If You Can't Patch
- Educate users about tapjacking risks and to be cautious when interacting with system dialogs
- Implement mobile device management (MDM) policies to restrict overlay permissions for all apps
🔍 How to Verify
Check if Vulnerable:
Check Android build date in Settings > About phone > Android version. If build date is before April 2025, device is likely vulnerable.
Check Version:
adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify the security patch level shows April 2025 or later in Settings > About phone > Android version > Android security update.
📡 Detection & Monitoring
Log Indicators:
- Unusual call forwarding settings changes
- Multiple failed attempts to modify call settings
- Apps requesting overlay permissions unexpectedly
Network Indicators:
- Unexpected call forwarding to unfamiliar numbers
- Call routing patterns that bypass normal carrier settings
SIEM Query:
android.security_event:("call_forwarding" OR "overlay_permission") AND action:modified