Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48529: Information disclosure in Google Android

0
Medium
VulnerabilityCVE-2025-48529cvecve-2025-48529
Published: Thu Sep 04 2025 (09/04/2025, 18:34:11 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In setRingtoneUri of VoicemailNotificationSettingsUtil.java , there is a possible cross user data leak due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/11/2025, 20:29:13 UTC

Technical Analysis

CVE-2025-48529 is a medium severity vulnerability affecting Google Android versions 13 through 16. The flaw resides in the setRingtoneUri method within the VoicemailNotificationSettingsUtil.java component. It is classified as a confused deputy problem (CWE-441), where the application improperly handles permissions or authority, leading to a cross-user data leak. Specifically, this vulnerability allows a local attacker with limited privileges (PR:L) to access sensitive information belonging to other users on the same device without requiring any user interaction (UI:N). The attack vector is local (AV:L), meaning the attacker must have some level of access to the device, but no elevated privileges beyond limited user rights are necessary. The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. Exploitation does not require user interaction, increasing the risk of stealthy data disclosure. Although no known exploits are currently reported in the wild, the medium CVSS score of 5.5 reflects the moderate risk posed by this vulnerability. The absence of patches at the time of publication suggests that affected organizations should prioritize mitigation and monitoring until official fixes are released.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to environments where Android devices are shared among multiple users or where devices are used in multi-user contexts, such as corporate mobile devices, kiosks, or shared terminals. The information disclosure could lead to leakage of sensitive voicemail or notification data across user boundaries, potentially exposing confidential communications or personal information. This could result in privacy violations under GDPR regulations, leading to legal and reputational consequences. Although the attack requires local access, insider threats or compromised devices could exploit this flaw to gather sensitive data without detection. The lack of required user interaction facilitates automated or stealthy exploitation, increasing the risk in high-security environments. Organizations relying heavily on Android devices for communication or sensitive data handling should consider this vulnerability a moderate threat to confidentiality and take proactive steps to mitigate exposure.

Mitigation Recommendations

Given the absence of an official patch at the time of this report, European organizations should implement specific mitigations beyond generic advice: 1) Restrict physical and local access to Android devices, enforcing strict device usage policies and limiting multi-user access where possible. 2) Employ Mobile Device Management (MDM) solutions to monitor and control application permissions and user profiles, ensuring that voicemail and notification settings are not accessible across user boundaries. 3) Audit and restrict installation of untrusted or unnecessary applications that could exploit local vulnerabilities. 4) Educate users and administrators about the risks of local privilege escalation and data leakage, emphasizing the importance of device security. 5) Monitor device logs and behavior for unusual access patterns to voicemail or notification settings that could indicate exploitation attempts. 6) Prepare for prompt deployment of official patches from Google once available, including testing and rapid rollout procedures. 7) Consider isolating sensitive user profiles or employing containerization techniques on Android devices to minimize cross-user data exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:10:57.282Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9dcc588499799243c2f6b

Added to database: 9/4/2025, 6:39:01 PM

Last enriched: 9/11/2025, 8:29:13 PM

Last updated: 10/16/2025, 4:14:19 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats