CVE-2025-26437

5.5 MEDIUM

📋 TL;DR

This vulnerability in Android's CredentialManagerService allows local attackers to retrieve candidate credentials without proper permission checks. It enables local information disclosure without requiring user interaction or additional privileges. All Android devices running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Android
Versions: Android versions prior to the June 2025 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All Android devices running affected versions are vulnerable by default. The vulnerability is in the framework layer.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access or malicious app could extract credential information from the credential manager, potentially compromising authentication data for various services.

🟠

Likely Case

Malicious apps could silently harvest credential information from the credential manager, leading to credential theft and potential account compromise.

🟢

If Mitigated

With proper app sandboxing and permission controls, the impact is limited to credential information that the vulnerable app itself has access to.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access or a malicious app. No user interaction needed, but app installation or physical access is required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Patch Level June 2025 or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-06-01

Restart Required: No

Instructions:

1. Check for system updates in Settings > System > System update. 2. Apply the June 2025 Android security patch. 3. Verify the patch level in Settings > About phone > Android version.

🔧 Temporary Workarounds

Restrict app installations

all

Only install apps from trusted sources like Google Play Store and avoid sideloading unknown apps.

Disable credential manager for sensitive apps

all

For critical applications, disable credential manager/autofill functionality in app settings.

🧯 If You Can't Patch

  • Implement strict app vetting and only allow trusted applications
  • Use mobile device management (MDM) solutions to restrict app installations and monitor for suspicious behavior

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version. If patch level is before June 2025, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows 'June 5, 2025' or later in Settings > About phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual credential manager access patterns
  • Multiple failed credential retrieval attempts from untrusted apps

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Look for credential manager service access from apps with suspicious permissions or from newly installed applications.

🔗 References

📤 Share & Export