CVE-2025-48625

7.0 HIGH

📋 TL;DR

This vulnerability allows local attackers to access USB data when the device screen is off due to a race condition in Android's USB protection mechanism. It enables local privilege escalation without requiring user interaction or additional execution privileges. Affects Android devices running vulnerable versions of the USB data protection component.

💻 Affected Systems

Products:
  • Android
Versions: Android 16 QPR2 and potentially earlier versions
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with USB data protection enabled. The vulnerability is in UsbDataAdvancedProtectionHook.java component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access or malicious app could access sensitive USB data (including potentially authentication tokens, files, or credentials) while the screen is off, leading to complete device compromise.

🟠

Likely Case

Malicious apps could exploit this to bypass USB data protection and access sensitive information that should be protected when the screen is locked.

🟢

If Mitigated

With proper security controls and timely patching, the risk is limited as exploitation requires local access and specific timing conditions.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring physical or local access to the device.
🏢 Internal Only: MEDIUM - Malicious insider or compromised device could exploit this to access protected USB data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and precise timing due to race condition. No user interaction needed but attacker needs to trigger the condition when screen is off.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android 16 QPR2 security update (specific build number from bulletin)

Vendor Advisory: https://source.android.com/security/bulletin/android-16-qpr2

Restart Required: Yes

Instructions:

1. Check for Android security updates in Settings > System > System update. 2. Install the latest security patch for Android 16 QPR2. 3. Reboot device after installation.

🔧 Temporary Workarounds

Disable USB debugging

android

Disable USB debugging to reduce attack surface for USB-related vulnerabilities

Settings > System > Developer options > USB debugging (toggle off)

Enable screen lock with strong authentication

android

Use strong screen lock (PIN/pattern/password) to prevent unauthorized physical access

Settings > Security > Screen lock

🧯 If You Can't Patch

  • Restrict physical access to devices and implement device loss/theft policies
  • Monitor for suspicious USB activity and implement mobile device management (MDM) controls

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version. If before February 2025 Android 16 QPR2 security update, device is likely vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows February 2025 or later Android 16 QPR2 update in Settings > About phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual USB access attempts when screen is off
  • Multiple rapid USB state changes
  • Access to protected USB data without proper authentication

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

android.security.usb.access OR usb.protection.violation OR screen.off.usb.activity

🔗 References

📤 Share & Export