Home

Description

On Wear OS devices, when Google Messages is configured as the default SMS/MMS/RCS application, the handling of ACTION_SENDTO intents utilizing the sms:, smsto:, mms:, and mmsto: Uniform Resource Identifier (URI) schemes is incorrectly implemented. Due to this misconfiguration, an attacker capable of invoking an Android intent can exploit this vulnerability to send messages on the user’s behalf to arbitrary receivers without requiring any further user interaction or specific permissions. This allows for the silent and unauthorized transmission of messages from a compromised Wear OS device.

PUBLISHED Reserved 2025-10-22 | Published 2025-10-27 | Updated 2025-10-27 | Assigner Google




MEDIUM: 6.9CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:L/SA:N

Problem types

CWE-345 Insufficient Verification of Data Authenticity

Product status

Default status
unaffected

Any version before 30-04-2025
affected

Credits

Gabriele Digregorio (Io_no) finder

References

towerofhanoi.it/writeups/cve-2025-12080/

cve.org (CVE-2025-12080)

nvd.nist.gov (CVE-2025-12080)

Download JSON