In getComponentName of AccessibilitySettingsUtils.java, there is a possible way to for a malicious Talkback service to be enabled instead of the system component due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://source.android.com/security/bulletin/wear/2025-05-01 |     | 
History
                    Fri, 05 Sep 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* | 
Fri, 05 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Google Google android | |
| Weaknesses | CWE-693 | |
| Vendors & Products | Google Google android | |
| Metrics | cvssV3_1 
 
 | 
Thu, 04 Sep 2025 19:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | In getComponentName of AccessibilitySettingsUtils.java, there is a possible way to for a malicious Talkback service to be enabled instead of the system component due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: google_android
Published: 2025-09-04T19:28:10.842Z
Updated: 2025-09-06T03:56:17.470Z
Reserved: 2025-02-10T18:29:33.000Z
Link: CVE-2025-26439
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-09-05T13:48:02.847Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-09-04T20:15:36.560
Modified: 2025-09-05T19:08:32.547
Link: CVE-2025-26439
 Redhat
                        Redhat
                    No data.