CVE-2025-22427
onCreate · onCreate Multiple Products
**A high-severity vulnerability in the Notification Access confirmation process could allow a malicious application to gain access to sensitive notification content without proper user consent.**.
Executive summary
A high-severity vulnerability in the Notification Access confirmation process could allow a malicious application to gain access to sensitive notification content without proper user consent.
Vulnerability
A flaw exists in the onCreate function of the NotificationAccessConfirmationActivity. This suggests an improper initialization or logic flaw in the UI component that asks the user to grant an application access to read notifications. A malicious app could exploit this to bypass the confirmation step or trick the user into granting permission.
Business impact
This vulnerability is rated high with a CVSS score of 7.3. If exploited, a malicious application could read the content of all notifications on a device. This could include sensitive information such as one-time passwords (OTPs) from SMS, private messages, calendar alerts, and email subjects, leading to account takeovers, data leakage, and a severe loss of privacy.
Remediation
Immediate Action: Apply the security updates from the vendor to fix the vulnerability in the notification access confirmation process.
Proactive Monitoring: Regularly audit which applications have been granted Notification Access permissions on managed devices. Revoke access for any application that does not have a legitimate need for it.
Compensating Controls: Prohibit the installation of applications from untrusted sources. Educate users on the sensitivity of the Notification Access permission and the risks of granting it to unknown applications.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This is a critical privacy and security vulnerability that must be addressed immediately. Deploying the vendor patch is the primary remediation. Proactive auditing of application permissions is a crucial secondary control to mitigate this and similar threats.