Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User

Posted on October 29, 2025October 29, 2025 By CWS

A vulnerability in Google Messages on Put on OS units permits any put in app to silently ship SMS, MMS, or RCS messages on behalf of the consumer.

Dubbed CVE-2025-12080, the problem stems from improper dealing with of ACTION_SENDTO intents utilizing URI schemes like sms:, smsto:, mms:, and mmsto:.

This misconfiguration bypasses consumer affirmation and permission checks, enabling attackers to dispatch messages to arbitrary recipients with out detection.

Google Messages, the default messaging app on most Put on OS smartwatches, exacerbates the danger. With restricted options obtainable, the flaw possible impacts the vast majority of units working the platform.

Disclosed earlier this yr, the vulnerability highlights ongoing challenges in securing wearable ecosystems, the place compact interfaces and implicit belief in system apps can amplify threats.

Safety agency io-no reported the problem by way of Google’s Cell Vulnerability Reward Program, incomes a $2,250 bounty earlier than a repair rolled out in Could 2025.

Put on OS Message App Vulnerability

At its core, the issue lies in Android’s intent system, a elementary mechanism for app-to-app communication. Intents enable parts to request actions, corresponding to opening a dialer or sending a message, by specifying an motion and an information URI.

Express intents goal a selected app part, whereas implicit ones let the system path to matching intent filters declared by apps. In concept, delicate operations like sending messages ought to set off a affirmation immediate within the receiving app to make sure consumer consent.

This prevents the “confused deputy” sample, the place a privileged app unwittingly executes actions for an untrusted caller. On commonplace Android, Google Messages adheres to this by prompting earlier than dispatch.

Nevertheless, on Put on OS, the app’s intent filters for messaging schemes fail to implement verification. Because of this, any app can fireplace an ACTION_SENDTO intent without having SEND_SMS permissions, and Google Messages will course of it robotically.

The vulnerability doesn’t require malicious code within the exploiting app; a easy, legitimate-looking software suffices. As an example, a benign health tracker or wallpaper app may embed the intent set off, activating on launch or button press.

Researchers notice that Put on OS options like Tiles or problems, which additionally launch intents, may prolong the assault floor, although these vectors stay unexplored.

The implications are extreme for privateness and funds. An attacker may distribute a trojanized app by way of sideloading or third-party shops, then exfiltrate knowledge by way of premium-rate SMS or harass contacts impersonating the sufferer.

Exploitation is stealthy: no pop-ups, no permission requests, and no seen traces past the despatched message log.

A proof-of-concept, obtainable on GitHub at io-no/CVE-Experiences, demonstrates the flaw utilizing Kotlin code to invoke the intent with a pattern message physique and recipient URI.

Examined on a Pixel Watch 3 with Put on OS (Android 15, construct BP1A.250305.019.w3) and Google Messages model 2025_0225_RC03, the PoC sends messages with out interplay, although it omits actual numbers for moral causes.

Google acknowledged the report on March 13, 2025, praised the invention, and deployed patches by Could. Customers ought to replace their units promptly and scrutinize app installations.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:App, Behalf, Google, Installed, Message, Send, SMS, User, Vulnerability, Wear

Post navigation

Previous Post: New Beast Ransomware Actively Scans for Active SMB Port from Breached System to Spread Across Network
Next Post: Chrome to Turn HTTPS on by Default for Public Sites

Related Posts

Microsoft to Kill Popular Editor Browser Extensions on Edge and Chrome Cyber Security News
Linux 6.16 Released – Optimized for Better Performance and Networking Cyber Security News
Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data Cyber Security News
Aembit Named to Rising in Cyber 2025 List of Top Cybersecurity Startups Cyber Security News
Hackers Leverage Compromised Third-Party SonicWall SSL VPN Credentials to Deploy Sinobi Ransomware Cyber Security News
How a Faulty Windows Driver Can Cause a System Crash and Blue Screen of Death Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Accessibility Flaw Allows Stealthy Persistence and Lateral Movement via Narrator DLL Hijack
  • XWiki Vulnerability Exploited in Cryptocurrency Mining Operation
  • Discover Practical AI Tactics for GRC — Join the Free Expert Webinar
  • Chrome to Turn HTTPS on by Default for Public Sites
  • Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Accessibility Flaw Allows Stealthy Persistence and Lateral Movement via Narrator DLL Hijack
  • XWiki Vulnerability Exploited in Cryptocurrency Mining Operation
  • Discover Practical AI Tactics for GRC — Join the Free Expert Webinar
  • Chrome to Turn HTTPS on by Default for Public Sites
  • Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News