CVE-2025-48629

7.8 HIGH

📋 TL;DR

This vulnerability allows a malicious app to become the default speech recognizer on Android devices without user interaction, enabling local privilege escalation. It affects Android devices running vulnerable versions where an attacker could intercept voice commands and potentially access sensitive data. All Android users with affected versions are at risk.

💻 Affected Systems

Products:
  • Android
Versions: Android 12 through Android 15 (specific versions listed in December 2025 security bulletin)
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with voice interaction services enabled. The vulnerability is in the system service that manages speech recognition defaults.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains persistent access to voice interactions, intercepting sensitive voice commands, accessing microphone data, and potentially escalating to other system privileges.

🟠

Likely Case

Malicious app silently becomes default speech recognizer, intercepting voice commands and potentially accessing voice data for surveillance or credential theft.

🟢

If Mitigated

With proper app vetting and security controls, exploitation would be limited to isolated voice data access without broader system compromise.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires installing a malicious app on the device. No user interaction needed once app is installed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Patch Level December 2025 or later

Vendor Advisory: https://source.android.com/security/bulletin/2025-12-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > System update. 2. Install December 2025 security patch or later. 3. Restart device after installation.

🔧 Temporary Workarounds

Disable third-party speech recognizers

android

Prevent apps from becoming default speech recognizer by disabling the setting

Review installed apps

android

Remove suspicious apps that request speech recognition permissions

🧯 If You Can't Patch

  • Disable voice interaction services in device settings
  • Only install apps from trusted sources like Google Play Store

🔍 How to Verify

Check if Vulnerable:

Check Settings > About phone > Android version > Android security patch level. If before December 2025, device is vulnerable.

Check Version:

Settings > About phone > Android version > Android security patch level

Verify Fix Applied:

Verify Android security patch level shows December 2025 or later date.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected changes to default speech recognizer app
  • Apps requesting speech recognition permissions without user interaction

Network Indicators:

  • Unusual network traffic from speech recognition apps

SIEM Query:

App installation events followed by speech recognition permission requests

🔗 References

📤 Share & Export