CVE-2025-22428

In · In hasInteractAcrossUsersFullPermission of Multiple Products

**A high-severity vulnerability in a permission-checking function could allow an application to gain unauthorized cross-user interaction capabilities, leading to privilege escalation.**.

Executive summary

A high-severity vulnerability in a permission-checking function could allow an application to gain unauthorized cross-user interaction capabilities, leading to privilege escalation.

Vulnerability

An unspecified flaw exists in the hasInteractAcrossUsersFullPermission function within the AppInfoBase component. This indicates a logic error in the code that verifies whether an application has the high-privilege permission to interact with other user accounts on a multi-user system, potentially allowing this check to be bypassed.

Business impact

A malicious or compromised application could exploit this flaw to break the security boundary between user accounts on a shared device. This would allow the app to access data from other user profiles, interfere with their applications, or perform actions on their behalf, leading to a major breach of privacy and potential privilege escalation. The CVSS score of 7.8 (High) reflects the severity of breaking user isolation.

Remediation

Immediate Action: Apply the security update from the vendor that corrects the logic in the permission validation function.

Proactive Monitoring: On multi-user systems, monitor for any anomalous cross-user process interactions or file access attempts that violate the intended security policy.

Compensating Controls: Limit the installation of third-party applications on shared, multi-user devices. Regularly review application permissions to ensure none have been granted excessive privileges.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability poses a serious threat to user data privacy and security on multi-user systems. It is imperative that administrators deploy the vendor-provided patch immediately to restore the integrity of the user separation security model.