
Cloud Vulnerability DB
A community-led vulnerabilities database
In multiple locations within Android versions 13.0, 14.0, and 15.0, there exists a vulnerability that allows for arbitrary code execution due to a logic error in the code. The vulnerability (CVE-2025-22429) was disclosed in September 2025 and affects multiple Android versions. This vulnerability requires no user interaction for exploitation and can lead to local privilege escalation without additional execution privileges (AttackerKB, Debian Tracker).
The vulnerability has been assigned a CVSS v3 Base Score of 9.8 (Critical), with an Impact Score of 5.9 and Exploitability Score of 3.9. The attack vector is Network (AV:N), with Low attack complexity (AC:L), requiring No privileges (PR:N), and No user interaction (UI:N). The scope is Unchanged (S:U) with High impact on Confidentiality (C:H), Integrity (I:H), and Availability (A:H) (AttackerKB).
The vulnerability can lead to local escalation of privilege with no additional execution privileges needed. The critical CVSS score of 9.8 indicates severe potential impacts on system security, potentially allowing attackers to execute arbitrary code and gain elevated privileges (AttackerKB).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."