CVE-2025-48564

7.0 HIGH

📋 TL;DR

This CVE describes an Android intent filter bypass vulnerability caused by a race condition in multiple framework components. It allows local privilege escalation without requiring user interaction or additional execution privileges. All Android devices running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Android
Versions: Specific versions not specified in references, but appears to affect multiple Android versions based on framework/base commits
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in multiple locations within Android frameworks/base and IntentResolver modules

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could gain elevated privileges, potentially compromising the entire device, accessing sensitive data, or installing persistent malware.

🟠

Likely Case

Malicious apps could bypass security restrictions to access protected components or data they shouldn't have permission to access.

🟢

If Mitigated

With proper app sandboxing and security controls, impact would be limited to the compromised app's context.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the device.
🏢 Internal Only: HIGH - Malicious apps or users with physical/network access to devices could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires race condition timing, making it moderately complex but feasible for skilled attackers

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Bulletin December 2025 patches

Vendor Advisory: https://source.android.com/security/bulletin/2025-12-01

Restart Required: Yes

Instructions:

1. Apply Android Security Bulletin December 2025 patches
2. Update affected Android devices to patched versions
3. Reboot devices after patch installation

🔧 Temporary Workarounds

Restrict app installations

android

Only allow installation of apps from trusted sources like Google Play Store

Disable unknown sources

android

Prevent installation of apps from unknown sources in device settings

🧯 If You Can't Patch

  • Isolate affected devices from critical networks and data
  • Implement strict app whitelisting policies and monitor for suspicious app behavior

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level - if before December 2025, device is likely vulnerable

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows December 2025 or later in Settings > About phone > Android version

📡 Detection & Monitoring

Log Indicators:

  • Unusual intent filter activity, privilege escalation attempts in system logs

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

Look for Android system logs showing unexpected intent resolution or permission escalation events

🔗 References

📤 Share & Export