CVE-2025-32326

7.8 HIGH

📋 TL;DR

This vulnerability in Android's Settings app allows a malicious app to bypass intent security checks through a confused deputy attack, enabling local privilege escalation. Attackers can exploit this to gain elevated permissions without additional execution privileges, but user interaction is required. This affects Android devices running vulnerable versions of the Settings application.

💻 Affected Systems

Products:
  • Android Settings application
Versions: Android versions prior to the September 2025 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the AppRestrictionsFragment component of the Settings app, which handles app restriction management.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full control over the device by escalating privileges to system-level access, potentially installing persistent malware, accessing sensitive data, or disabling security controls.

🟠

Likely Case

A malicious app tricks the user into granting permissions that bypass security restrictions, allowing the app to perform unauthorized actions like accessing protected settings or user data.

🟢

If Mitigated

With proper app sandboxing and security updates, the attack surface is minimized, though the vulnerability could still be exploited if users install untrusted apps.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction, such as tricking the user into interacting with a malicious app or dialog, making it less trivial but still feasible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level September 2025 or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-09-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > System update. 2. Install the September 2025 Android security patch or later. 3. Restart the device after installation.

🔧 Temporary Workarounds

Disable unknown sources

android

Prevent installation of apps from unknown sources to reduce the risk of malicious apps exploiting this vulnerability.

Review app permissions

android

Regularly audit and restrict app permissions in Settings to minimize potential damage from exploited apps.

🧯 If You Can't Patch

  • Isolate affected devices from sensitive networks and data to limit potential impact.
  • Implement application allowlisting to prevent installation of untrusted apps that could exploit this vulnerability.

🔍 How to Verify

Check if Vulnerable:

Check the Android security patch level in Settings > About phone > Android version. If the patch level is earlier than September 2025, the device is likely vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify that the security patch level is September 2025 or later in Settings > About phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual activity in the Settings app logs, such as unexpected intent calls or permission changes related to app restrictions.

Network Indicators:

  • No direct network indicators as this is a local privilege escalation vulnerability.

SIEM Query:

Search for events involving the Settings package (com.android.settings) with suspicious intent actions or privilege escalation attempts.

🔗 References

📤 Share & Export