Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-26422
Analyzed
More InfoOfficial Page
Source-security@android.com
View Known Exploited Vulnerability (KEV) details
Published At-04 Sep, 2025 | 18:15
Updated At-05 Sep, 2025 | 18:55

In dump of WindowManagerService.java, there is a possible way of running dumpsys without the required permission due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.0MEDIUM
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 4.0
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CPE Matches

Google LLC
google
>>android>>15.0
cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-279Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-279
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://android.googlesource.com/platform/frameworks/base/+/63ae789499395abc2b71fd46f57cac3c4ba1bd9dsecurity@android.com
Patch
https://source.android.com/security/bulletin/2025-05-01security@android.com
Vendor Advisory
Hyperlink: https://android.googlesource.com/platform/frameworks/base/+/63ae789499395abc2b71fd46f57cac3c4ba1bd9d
Source: security@android.com
Resource:
Patch
Hyperlink: https://source.android.com/security/bulletin/2025-05-01
Source: security@android.com
Resource:
Vendor Advisory
Change History
0Changes found

Details not found