CVE-2025-26428Authentication Bypass by Spoofing in Frameworks Base

Severity
3.2LOWNVD
EPSS
0.0%
top 98.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 4

Description

In startLockTaskMode of LockTaskController.java, there is a possible lock screen bypass due to a logic error in the code. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

CVSS vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:NExploitability: 0.7 | Impact: 2.5

Affected Packages3 packages

Androidplatform/frameworks_base15-next:015-next:2025-05-01+3
CVEListV5google/android13, 14, 15+2
NVDgoogle/android13.0, 14.0, 15.0+2

Patches

🔴Vulnerability Details

3
CVEList
CVE-2025-26428: In startLockTaskMode of LockTaskController2025-09-04
GHSA
GHSA-8r65-jwf6-5j33: In startLockTaskMode of LockTaskController2025-09-04
OSV
CVE-2025-26428: In startLockTaskMode of LockTaskController2025-05-01

📋Vendor Advisories

1
Android
CVE-2025-26428: Android Security Bulletin 2025-05-01 CVE: CVE-2025-26428 Severity: HIGH Type: EoP Affected AOSP versions: 13, 14, 15 References: A-3785146142025-05-01
CVE-2025-26428 — Authentication Bypass by Spoofing | cvebase