CVE-2025-48550

5.5 MEDIUM

📋 TL;DR

This CVE describes a path traversal vulnerability in Android's SliceManagerTest component that allows local attackers to cause permanent denial of service without requiring user interaction or elevated privileges. The vulnerability affects Android devices running vulnerable versions, potentially rendering affected components unusable until factory reset.

💻 Affected Systems

Products:
  • Android
Versions: Specific versions mentioned in Android Security Bulletin 2025-09-01
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with the vulnerable test component present, though test components may not be present in production builds.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Permanent denial of service affecting critical system components, potentially requiring factory reset to restore functionality.

🟠

Likely Case

Local denial of service affecting specific application components or services, disrupting normal device operation.

🟢

If Mitigated

Limited impact due to sandboxing and SELinux policies restricting the scope of damage.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring physical or local network access to the device.
🏢 Internal Only: MEDIUM - Malicious apps or users with local access could exploit this to disrupt device functionality.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of the vulnerable test component. No user interaction needed but requires app installation or local execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Patch Level 2025-09-01 or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-09-01

Restart Required: No

Instructions:

1. Check for system updates in Settings > System > System update. 2. Apply the September 2025 security patch or later. 3. Verify patch installation in Settings > About phone > Android security patch level.

🔧 Temporary Workarounds

Disable test components

Android

Remove or disable test components from production builds if possible

adb shell pm disable com.android.test.slice

🧯 If You Can't Patch

  • Restrict installation of untrusted applications
  • Implement application allowlisting to prevent malicious apps from exploiting the vulnerability

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android security patch level. If before September 2025, device may be vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows September 2025 or later in Settings > About phone > Android security patch level.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access attempts to SliceManagerTest components
  • Path traversal patterns in system logs

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

source="android_system" AND ("SliceManagerTest" OR "testGrantSlicePermission") AND ("path traversal" OR "denial of service")

🔗 References

📤 Share & Export