CVE-2025-32346

7.8 HIGH

📋 TL;DR

This vulnerability allows a malicious app to access work profile contact numbers from the voicemail settings component without proper permission checks. It affects Android devices with work profiles enabled, potentially exposing sensitive corporate contact information. Exploitation requires no user interaction and no additional privileges.

💻 Affected Systems

Products:
  • Android
Versions: Android versions prior to September 2025 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Requires work profile feature to be enabled and used on the device.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all work profile contact numbers to malicious apps, enabling targeted phishing, social engineering, or corporate espionage campaigns.

🟠

Likely Case

Malicious apps silently harvest work contact information for data aggregation or targeted advertising purposes.

🟢

If Mitigated

With proper app isolation and permission controls, impact is limited to apps already installed on the device.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring app installation on the device.
🏢 Internal Only: HIGH - Malicious apps on corporate devices can access sensitive work contact information without detection.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires creating a malicious app that triggers the vulnerable onActivityResult method in VoicemailSettingsActivity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: September 2025 Android security patch level or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-09-01

Restart Required: Yes

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Install September 2025 security patch or later. 3. Restart device after installation.

🔧 Temporary Workarounds

Disable work profile

android

Remove or disable the work profile feature to eliminate the attack surface

Settings > Accounts > Work profile > Remove work profile

Restrict app installations

android

Only allow installation from trusted sources like Google Play Store

Settings > Security > Install unknown apps > Disable for all apps

🧯 If You Can't Patch

  • Implement mobile device management (MDM) with strict app whitelisting policies
  • Educate users about risks of installing apps from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version > Security patch level

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows September 2025 or later date

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to VoicemailSettingsActivity
  • Apps requesting work profile permissions without business need

Network Indicators:

  • Unusual data exfiltration from devices with work profiles

SIEM Query:

source="android_logs" AND activity="VoicemailSettingsActivity" AND result_code=RESULT_OK AND data_uri CONTAINS "contacts"

🔗 References

📤 Share & Export