CVE-2025-22431

5.5 MEDIUM

📋 TL;DR

This vulnerability allows a malicious Android app to block emergency calls (911/112) under specific conditions due to a logic error. It affects Android devices running vulnerable versions and requires no user interaction or special permissions to exploit. The impact is a local denial of service for emergency dialing until the device is rebooted.

💻 Affected Systems

Products:
  • Android
Versions: Specific versions not detailed in references; check Android Security Bulletin April 2025
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Android devices with the vulnerable framework code; exact device models depend on OEM patch adoption.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Emergency services cannot be reached from the affected device during a critical situation, potentially delaying life-saving assistance.

🟠

Likely Case

Malicious apps could silently prevent emergency calls, creating safety risks for users who rely on their devices for emergencies.

🟢

If Mitigated

With proper patching, the vulnerability is eliminated; without patching, the risk persists but requires a malicious app to be installed.

🌐 Internet-Facing: LOW (exploitation requires local app installation, not network exposure)
🏢 Internal Only: MEDIUM (malicious apps could be distributed internally via sideloading or compromised app stores)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires a malicious app to be installed; no user interaction needed once installed. Logic error in code allows blocking emergency dialing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Android Security Bulletin for April 2025 patches

Vendor Advisory: https://source.android.com/security/bulletin/2025-04-01

Restart Required: No

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Apply the latest security patch from April 2025 or later. 3. No reboot is required after patching based on the description.

🔧 Temporary Workarounds

Restrict app installations

Android

Prevent installation of untrusted apps by enabling Google Play Protect and disabling unknown sources.

Settings > Security > Google Play Protect (enable)
Settings > Security > Install unknown apps (disable for all apps)

🧯 If You Can't Patch

  • Monitor for suspicious apps and uninstall any untrusted applications.
  • Reboot the device if emergency dialing is blocked to temporarily restore functionality.

🔍 How to Verify

Check if Vulnerable:

Check Android version and security patch level in Settings > About phone > Android version.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Ensure the security patch level is April 2025 or later; test emergency dialing (e.g., dial 911 in a safe test environment if allowed).

📡 Detection & Monitoring

Log Indicators:

  • Log entries showing failed emergency call attempts or app interference with phone services

Network Indicators:

  • None (exploitation is local)

SIEM Query:

Search for events related to emergency call failures or malicious app installations on Android devices.

🔗 References

📤 Share & Export