CVE-2025-48551

5.0 MEDIUM

📋 TL;DR

This Android vulnerability allows malicious apps to leak images across user isolation boundaries via a confused deputy attack. It requires user interaction for exploitation and affects Android devices with vulnerable versions. Local attackers can access images from other users without additional privileges.

💻 Affected Systems

Products:
  • Android
Versions: Specific versions mentioned in Android Security Bulletin 2025-09-01
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with multiple user profiles enabled. Requires malicious app installation and user interaction.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive images from other user profiles (including work profiles) could be accessed by a malicious app, potentially exposing personal photos, documents, or screenshots.

🟠

Likely Case

Limited image data leakage between user profiles, potentially exposing non-sensitive images or metadata.

🟢

If Mitigated

With proper app sandboxing and user isolation controls, impact is limited to low-risk information disclosure.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring physical access or malicious app installation.
🏢 Internal Only: MEDIUM - In enterprise environments with multiple user profiles, sensitive work images could be exposed to personal profile apps.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction and malicious app installation. Exploit involves confused deputy pattern in IntentResolver module.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Patch Level 2025-09-01 or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-09-01

Restart Required: No

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Install September 2025 security patch or later. 3. No device restart required for this specific patch.

🔧 Temporary Workarounds

Restrict app installations

all

Only install apps from trusted sources like Google Play Store and avoid sideloading unknown apps.

Disable unnecessary user profiles

all

Remove or disable guest profiles and secondary user accounts if not needed.

🧯 If You Can't Patch

  • Implement strict app vetting policies and only allow installation of trusted applications
  • Educate users about risks of installing unknown apps and granting unnecessary permissions

🔍 How to Verify

Check if Vulnerable:

Check Android version and security patch level in Settings > About phone > Android version. If patch level is before September 2025, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows 'September 1, 2025' or later in Settings > About phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual IntentResolver activity, cross-profile image access attempts, permission boundary violations

Network Indicators:

  • No network indicators - this is a local vulnerability

SIEM Query:

Look for Android security events related to permission boundary violations or cross-profile access attempts in device management logs.

🔗 References

📤 Share & Export