CVE-2025-32312
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-04

Last updated on: 2025-09-05

Assigner: Android (associated with Google Inc. or Open Handset Alliance)

Description
In createIntentsList of PackageParser.java , there is a possible way to bypass lazy bundle hardening, allowing modified data to be passed to the next process due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-04
Last Modified
2025-09-05
Generated
2026-05-07
AI Q&A
2025-09-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
google android 13.0
google android 15.0
google android 14.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Android PackageManager component, specifically in the PackageParser.java file. It allows unsafe deserialization that can bypass lazy bundle hardening, enabling modified data to be passed to the next process. This happens because the system unrestrictedly constructs subclasses, allowing potentially arbitrary classes to be instantiated during package parsing. This can lead to local escalation of privilege without needing additional execution privileges or user interaction. [1]


How can this vulnerability impact me? :

The vulnerability can lead to local escalation of privilege on an affected Android device. An attacker could exploit this flaw to gain higher privileges locally without requiring additional execution rights or user interaction, potentially allowing unauthorized actions or access within the system. [1]


What immediate steps should I take to mitigate this vulnerability?

Apply the security patch that restricts subclass construction in the PackageParser component of the Android framework. This patch prevents the creation of arbitrary classes during package parsing, mitigating the vulnerability. Ensure your Android system is updated with the fix committed on March 19, 2025, which addresses this issue. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart