CVE-2025-26445

5.5 MEDIUM

📋 TL;DR

This vulnerability allows local attackers to access sensitive network connectivity data without proper permissions. It affects Android devices running vulnerable versions of the ConnectivityService. No user interaction is required for exploitation.

💻 Affected Systems

Products:
  • Android
Versions: Specific Android versions mentioned in the June 2025 security bulletin
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Android devices with the vulnerable ConnectivityService implementation. Check the Android security bulletin for specific affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could extract network configuration details, connection states, or other connectivity-related sensitive information that should be protected by permissions.

🟠

Likely Case

Malicious apps could gather network information about the device without user consent, potentially enabling further attacks or privacy violations.

🟢

If Mitigated

With proper app sandboxing and security updates, the risk is limited to apps that have already bypassed some security controls.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the device.
🏢 Internal Only: MEDIUM - Local attackers or malicious apps could exploit this without additional privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the device. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level June 2025 or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-06-01

Restart Required: No

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Apply the June 2025 security patch or later. 3. Verify the patch level in Settings > About phone > Android version.

🔧 Temporary Workarounds

Restrict app permissions

all

Review and restrict network-related permissions for untrusted applications

🧯 If You Can't Patch

  • Implement strict app vetting and only install applications from trusted sources
  • Use mobile device management (MDM) solutions to enforce security policies and monitor for suspicious behavior

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version. If patch level is before June 2025, the device may be vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify the security patch level shows June 2025 or later in Settings > About phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual connectivity service access attempts, permission denial logs for network-related operations

Network Indicators:

  • No network indicators as this is a local vulnerability

SIEM Query:

Look for connectivity service access patterns from untrusted applications or permission violation logs

🔗 References

📤 Share & Export