CVE-2025-26424
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-04

Last updated on: 2025-09-05

Assigner: Android (associated with Google Inc. or Open Handset Alliance)

Description
In multiple functions of VpnManager.java, there is a possible cross-user data leak due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-04
Last Modified
2025-09-05
Generated
2026-05-07
AI Q&A
2025-09-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
google android 15.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a logic error in the Android platform's VpnManager.java that allows unauthorized applications to access VPN profile methods that should be restricted. Due to improper permission checks, apps without the necessary privileges could access sensitive VPN profile APIs, potentially causing cross-user data leaks without needing any user interaction or additional execution privileges. [1]


How can this vulnerability impact me? :

The vulnerability can lead to local information disclosure by allowing unauthorized apps to access sensitive VPN profile data. This could expose private VPN configurations or user data to apps that should not have access, potentially compromising user privacy and security on the affected Android device. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves checking if unauthorized applications can access VPN profile APIs without the required permissions (NETWORK_STACK or PERMISSION_MAINLINE_NETWORK_STACK). On an Android device, you can audit app permissions and monitor calls to VpnManagerService methods. Specific commands are not provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Apply the security update that restricts access to VPN profile methods in VpnManagerService to only apps with NETWORK_STACK or PERMISSION_MAINLINE_NETWORK_STACK permissions. Ensure your Android system is updated with the patch committed and merged in early 2025 that enforces these permission checks. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart