CVE-2025-22419
multiple · multiple Multiple Products
**A high-severity tapjacking vulnerability in multiple products could allow an attacker to trick a user into enabling malicious call forwarding without their knowledge.**.
Executive summary
A high-severity tapjacking vulnerability in multiple products could allow an attacker to trick a user into enabling malicious call forwarding without their knowledge.
Vulnerability
The software is susceptible to a tapjacking (or UI overlay) attack. A malicious application can create a transparent overlay on top of a legitimate system dialog, tricking the user into tapping a button (e.g., "Allow") that enables call forwarding to an attacker-controlled number, while the user believes they are interacting with a harmless application.
Business impact
This vulnerability is rated high with a CVSS score of 7.3. Successful exploitation leads to a serious breach of privacy and security. The attacker can intercept the victim's incoming phone calls, which could include sensitive personal conversations or calls used for two-factor authentication (2FA), leading to account takeovers and financial loss.
Remediation
Immediate Action: Apply the vendor-provided security update, which will likely implement protections against UI overlays on sensitive dialogs.
Proactive Monitoring: While difficult to monitor directly, users should be encouraged to report any suspicious behavior, such as calls not being received. Periodically check call forwarding settings on devices to ensure they have not been maliciously altered.
Compensating Controls: Restrict the installation of applications from untrusted sources. Use Android's "Display over other apps" permission manager to audit and revoke this sensitive permission from non-essential applications.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability poses a direct threat to user security and privacy through call interception. It is imperative to deploy the vendor patch immediately. User education on the risks of third-party applications and reviewing app permissions are also critical mitigating actions.