CVE-2025-26424

4.0 MEDIUM

📋 TL;DR

This CVE describes a cross-user data leak vulnerability in Android's VpnManager component where a logic error allows unauthorized access to VPN configuration data across user profiles. It affects Android devices with multiple user profiles enabled, potentially exposing VPN settings and connection information between users without requiring elevated privileges.

💻 Affected Systems

Products:
  • Android
Versions: Android versions prior to the May 2025 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Requires multiple user profiles to be configured on the device for the vulnerability to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious app running in one user profile could access VPN configurations, connection details, and potentially sensitive network information from other user profiles on the same device.

🟠

Likely Case

Information disclosure of VPN settings and connection status between user profiles, potentially revealing network configuration details and usage patterns.

🟢

If Mitigated

Limited exposure of non-critical VPN metadata if proper app sandboxing and user isolation are maintained.

🌐 Internet-Facing: LOW - This is a local information disclosure vulnerability that doesn't directly expose systems to internet-based attacks.
🏢 Internal Only: MEDIUM - While local, it allows cross-user data leakage which could be exploited by malicious apps to gather information about other users' network configurations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires a malicious app to be installed on the device and running in one user profile to access data from other profiles. No user interaction needed once app is installed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android May 2025 security patch or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-05-01

Restart Required: No

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Apply the May 2025 security patch or later. 3. No device restart should be required for this specific patch.

🔧 Temporary Workarounds

Disable multiple user profiles

Android

Remove or disable additional user profiles to eliminate the cross-user data leakage vector

Settings > System > Multiple users > Remove additional users

🧯 If You Can't Patch

  • Restrict installation of untrusted applications through enterprise mobile device management (MDM) policies
  • Use app isolation/sandboxing solutions to limit cross-profile data access

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version > Security patch level. If date is before May 2025, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows May 2025 or later date in Settings > About phone > Android version > Security patch level.

📡 Detection & Monitoring

Log Indicators:

  • Unusual cross-profile VPN configuration access attempts in system logs
  • Multiple failed VPN connection attempts from different user profiles

Network Indicators:

  • None - this is a local information disclosure vulnerability

SIEM Query:

Not applicable for local information disclosure vulnerabilities

🔗 References

📤 Share & Export