Skip to main content

CVE-2025-48526: Elevation of privilege in Google Android

Medium
VulnerabilityCVE-2025-48526cvecve-2025-48526
Published: Thu Sep 04 2025 (09/04/2025, 18:34:07 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In createMultiProfilePagerAdapter of ChooserActivity.java , there is a possible way for an app to launch the ChooserActivity in another profile due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/04/2025, 19:11:29 UTC

Technical Analysis

CVE-2025-48526 is a local elevation of privilege vulnerability affecting Google Android versions 13 through 16. The flaw exists in the createMultiProfilePagerAdapter method within the ChooserActivity.java component. Specifically, improper input validation allows a malicious application to launch the ChooserActivity in another user profile on the same device. This cross-profile activity launch bypasses intended security boundaries between user profiles. Exploitation does not require any additional execution privileges beyond those already granted to the malicious app, nor does it require any user interaction, making it a stealthy and potentially reliable attack vector. By leveraging this vulnerability, an attacker could escalate their privileges locally, gaining access to resources or data in other profiles that should be isolated. Since Android supports multiple user profiles to separate work and personal data or multiple users on the same device, this vulnerability undermines the fundamental security model of profile isolation. The vulnerability was reserved in May 2025 and published in September 2025, with no known exploits in the wild at the time of disclosure. No CVSS score has been assigned yet, and no patches or mitigations have been officially linked, indicating that affected users and organizations should prioritize monitoring for updates and consider interim mitigations. The vulnerability's impact is significant because it allows privilege escalation without user interaction or additional privileges, increasing the risk of unauthorized data access or control over other profiles on the device.

Potential Impact

For European organizations, this vulnerability poses a risk primarily on Android devices used within corporate environments that utilize multiple user profiles, such as BYOD (Bring Your Own Device) policies or devices shared among employees. The ability for a malicious app to escalate privileges across profiles could lead to unauthorized access to sensitive corporate data, breach of privacy regulations such as GDPR, and potential lateral movement within enterprise mobile environments. Since user interaction is not required, the attack could be automated or triggered silently, increasing the risk of undetected compromise. The impact extends to sectors with high mobile device usage and strict data protection requirements, including finance, healthcare, and government agencies. Additionally, the vulnerability could be exploited to bypass security controls implemented via profile separation, undermining mobile device management (MDM) solutions that rely on profile isolation. This could result in data leakage, unauthorized access to corporate apps, or manipulation of device settings, ultimately affecting organizational security posture and compliance.

Mitigation Recommendations

Given the absence of an official patch at the time of disclosure, European organizations should implement the following specific mitigations: 1) Restrict installation of untrusted or third-party applications by enforcing strict app vetting and using enterprise app stores or Mobile Application Management (MAM) solutions. 2) Employ Mobile Device Management (MDM) policies to limit the creation and use of multiple profiles on corporate devices, or disable secondary profiles where feasible. 3) Monitor device logs and behavior for unusual activity related to profile switching or ChooserActivity launches, leveraging endpoint detection and response (EDR) tools tailored for mobile devices. 4) Educate users on the risks of installing apps from unknown sources and encourage adherence to corporate security policies. 5) Maintain up-to-date inventories of Android devices and their OS versions to prioritize upgrades once patches become available. 6) Collaborate with Google and device vendors to expedite patch deployment and validate remediation. 7) Consider deploying application sandboxing or containerization solutions that add an additional layer of isolation beyond Android profiles. These targeted mitigations go beyond generic advice by focusing on controlling profile usage, app installation policies, and proactive monitoring specific to the vulnerability's exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:10:57.282Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9dcc588499799243c2f5f

Added to database: 9/4/2025, 6:39:01 PM

Last enriched: 9/4/2025, 7:11:29 PM

Last updated: 9/5/2025, 8:04:45 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats