CVE-2025-48594

7.3 HIGH

📋 TL;DR

This vulnerability allows a malicious companion application to retain elevated privileges after being disassociated from a device, enabling local privilege escalation. It affects Android devices where companion apps can be installed. User interaction is required for exploitation.

💻 Affected Systems

Products:
  • Android
Versions: Android versions prior to the December 2025 security update
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices where companion applications are supported and used.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains persistent elevated privileges on the device, potentially accessing sensitive data or performing unauthorized actions with system-level permissions.

🟠

Likely Case

A malicious companion app maintains privileges it should have lost after disassociation, allowing continued access to restricted functionality.

🟢

If Mitigated

With proper Android security updates, the vulnerability is patched and companion apps properly lose privileges upon disassociation.

🌐 Internet-Facing: LOW - Exploitation requires local access and user interaction with a malicious app.
🏢 Internal Only: MEDIUM - Within an organization, a malicious insider could exploit this if they can install companion apps on corporate devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user to install and interact with a malicious companion application, then trigger disassociation while the app retains privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android December 2025 security update

Vendor Advisory: https://source.android.com/security/bulletin/2025-12-01

Restart Required: Yes

Instructions:

1. Check for Android system updates in Settings > System > System update. 2. Install the December 2025 security update. 3. Restart the device after installation.

🔧 Temporary Workarounds

Disable companion app functionality

android

Prevent installation or use of companion applications on vulnerable devices

Restrict app installation sources

android

Only allow app installations from trusted sources like Google Play Store

Settings > Security > Install unknown apps > Disable for all sources

🧯 If You Can't Patch

  • Monitor for suspicious companion app behavior and review app permissions regularly
  • Implement mobile device management (MDM) policies to control app installation and permissions

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version > Security patch level. If before December 2025, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows 'December 1, 2025' or later in Settings > About phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege retention by companion apps after disassociation events
  • Companion app processes maintaining elevated permissions

Network Indicators:

  • Companion apps communicating after being disassociated

SIEM Query:

Processes with companion app permissions AND disassociation events without permission revocation

🔗 References

📤 Share & Export