CVE-2025-26424
📋 TL;DR
This CVE describes a cross-user data leak vulnerability in Android's VpnManager component where a logic error allows unauthorized access to VPN configuration data across user profiles. It affects Android devices with multiple user profiles enabled, potentially exposing VPN settings and connection information between users without requiring elevated privileges.
💻 Affected Systems
- Android
📦 What is this software?
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
Malicious app running in one user profile could access VPN configurations, connection details, and potentially sensitive network information from other user profiles on the same device.
Likely Case
Information disclosure of VPN settings and connection status between user profiles, potentially revealing network configuration details and usage patterns.
If Mitigated
Limited exposure of non-critical VPN metadata if proper app sandboxing and user isolation are maintained.
🎯 Exploit Status
Exploitation requires a malicious app to be installed on the device and running in one user profile to access data from other profiles. No user interaction needed once app is installed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Android May 2025 security patch or later
Vendor Advisory: https://source.android.com/security/bulletin/2025-05-01
Restart Required: No
Instructions:
1. Check for Android system updates in Settings > System > System update. 2. Apply the May 2025 security patch or later. 3. No device restart should be required for this specific patch.
🔧 Temporary Workarounds
Disable multiple user profiles
AndroidRemove or disable additional user profiles to eliminate the cross-user data leakage vector
Settings > System > Multiple users > Remove additional users
🧯 If You Can't Patch
- Restrict installation of untrusted applications through enterprise mobile device management (MDM) policies
- Use app isolation/sandboxing solutions to limit cross-profile data access
🔍 How to Verify
Check if Vulnerable:
Check Android security patch level in Settings > About phone > Android version > Security patch level. If date is before May 2025, device is vulnerable.
Check Version:
adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify security patch level shows May 2025 or later date in Settings > About phone > Android version > Security patch level.
📡 Detection & Monitoring
Log Indicators:
- Unusual cross-profile VPN configuration access attempts in system logs
- Multiple failed VPN connection attempts from different user profiles
Network Indicators:
- None - this is a local information disclosure vulnerability
SIEM Query:
Not applicable for local information disclosure vulnerabilities