Security7 views

Android Vulnerability CVE-2025-48561: "Pixnapping" Attack Steals Private Data Through Screen Pixels

A critical security flaw in Android allows attackers to steal sensitive information by analyzing screen pixels—without requesting any system permissions.

What is Pixnapping?

The attack, dubbed "Pixnapping," works through a malicious app that:

  • Requires no system permissions from the victim
  • Reads information displayed by other apps on screen
  • Analyzes specific pixels to map letters, numbers, and shapes

Attack Success Rates

Testing revealed alarming results on Google Pixel devices (6, 7, 8, and 9):

  • 2FA codes recovered: 29% to 79% success rate
  • Average extraction time: 14 to 25 seconds
  • Target: 6-digit authentication codes

Google's Response

  • Mitigations released: Last month
  • Additional patch: Coming in December's Android security bulletin
  • Current status: No evidence of malicious exploitation detected

How It Works

The vulnerability (CVE-2025-48561) exploits Android's screen rendering by reading pixel-level data without triggering permission requests that would normally alert users to suspicious activity.


Stay Protected: Update your Android device immediately when December's security patch becomes available. Source: Ars Technica