Introduction
Earlier this year, I discovered a critical security flaw in the Android Lock Screen that shocked even me when I first reproduced it. The vulnerability allowed lock screen bypass and unauthorised access to Google accounts, Gemini data, and even connected apps, all without requiring a PIN, password, or biometric input.
In this post, I will walk through:
The Discovery
The bug emerged from a subtle race condition occurring between Bixby (Samsung’s assistant) and the on-screen keyboard navigation toggle. On non-Samsung devices, the same flaw could be triggered directly via Google Gemini assistant activation.
This revealed a serious oversight: Android 14’s lock screen protections could be bypassed through mere UI manipulation no malware, no rooting, no advanced exploitation.
Vulnerability Summary
Title: Lock Screen Bypass via Gemini & Keyboard/Bixby Race Condition
Impacted Platforms: Android 13, 14, 15 (reproduced on Samsung Galaxy S23 FE, Pixel 7 Pro, and likely other devices)
Severity: High / Critical
Exploitation Steps (simplified)
(Pixel and other Android devices: no race needed, direct Gemini popup already works)
At this point, the phone is essentially “open” without ever touching the PIN/password.
Proof Of Concept (POC) :
Security Impact
The vulnerability impacted all three classic pillars of security (CIA):
Coordinated Disclosure
I reported the issue to Google’s Vulnerability Reward Program (VRP) in March 2025. The coordination journey was constructive and collaborative, involving multiple follow-ups with Google’s Trust & Safety, Product Security, and Abuse teams.
The teams acknowledged the issue, filed it for remediation, and provided me with a generous reward as part of the program. More importantly, they ensured the flaw was addressed responsibly within the ecosystem.
Responsible Disclosure Timeline
Conclusion
This vulnerability demonstrates how even simple input-handling flaws can erode core trust boundaries in mobile devices. A locked Android 14 phone was anything but secure, with Gemini effectively handing attackers a backdoor to sensitive data. Through constructive collaboration with Google’s VRP team, the vulnerability was acknowledged, and I received a fair monetary reward for the finding. Most importantly, fixes are being prioritised to prevent real-world exploitation.