CVE-2025-48529: Information disclosure in Google Android
In setRingtoneUri of VoicemailNotificationSettingsUtil.java , there is a possible cross user data leak due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
AI Analysis
Technical Summary
CVE-2025-48529 is a medium severity vulnerability affecting Google Android versions 13 through 16. The flaw resides in the setRingtoneUri method within the VoicemailNotificationSettingsUtil.java component. It is classified as a confused deputy problem (CWE-441), where the application improperly handles permissions or authority, leading to a cross-user data leak. Specifically, this vulnerability allows a local attacker with limited privileges (PR:L) to access sensitive information belonging to other users on the same device without requiring any user interaction (UI:N). The attack vector is local (AV:L), meaning the attacker must have some level of access to the device, but no elevated privileges beyond limited user rights are necessary. The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. Exploitation does not require user interaction, increasing the risk of stealthy data disclosure. Although no known exploits are currently reported in the wild, the medium CVSS score of 5.5 reflects the moderate risk posed by this vulnerability. The absence of patches at the time of publication suggests that affected organizations should prioritize mitigation and monitoring until official fixes are released.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to environments where Android devices are shared among multiple users or where devices are used in multi-user contexts, such as corporate mobile devices, kiosks, or shared terminals. The information disclosure could lead to leakage of sensitive voicemail or notification data across user boundaries, potentially exposing confidential communications or personal information. This could result in privacy violations under GDPR regulations, leading to legal and reputational consequences. Although the attack requires local access, insider threats or compromised devices could exploit this flaw to gather sensitive data without detection. The lack of required user interaction facilitates automated or stealthy exploitation, increasing the risk in high-security environments. Organizations relying heavily on Android devices for communication or sensitive data handling should consider this vulnerability a moderate threat to confidentiality and take proactive steps to mitigate exposure.
Mitigation Recommendations
Given the absence of an official patch at the time of this report, European organizations should implement specific mitigations beyond generic advice: 1) Restrict physical and local access to Android devices, enforcing strict device usage policies and limiting multi-user access where possible. 2) Employ Mobile Device Management (MDM) solutions to monitor and control application permissions and user profiles, ensuring that voicemail and notification settings are not accessible across user boundaries. 3) Audit and restrict installation of untrusted or unnecessary applications that could exploit local vulnerabilities. 4) Educate users and administrators about the risks of local privilege escalation and data leakage, emphasizing the importance of device security. 5) Monitor device logs and behavior for unusual access patterns to voicemail or notification settings that could indicate exploitation attempts. 6) Prepare for prompt deployment of official patches from Google once available, including testing and rapid rollout procedures. 7) Consider isolating sensitive user profiles or employing containerization techniques on Android devices to minimize cross-user data exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Finland
CVE-2025-48529: Information disclosure in Google Android
Description
In setRingtoneUri of VoicemailNotificationSettingsUtil.java , there is a possible cross user data leak due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2025-48529 is a medium severity vulnerability affecting Google Android versions 13 through 16. The flaw resides in the setRingtoneUri method within the VoicemailNotificationSettingsUtil.java component. It is classified as a confused deputy problem (CWE-441), where the application improperly handles permissions or authority, leading to a cross-user data leak. Specifically, this vulnerability allows a local attacker with limited privileges (PR:L) to access sensitive information belonging to other users on the same device without requiring any user interaction (UI:N). The attack vector is local (AV:L), meaning the attacker must have some level of access to the device, but no elevated privileges beyond limited user rights are necessary. The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. Exploitation does not require user interaction, increasing the risk of stealthy data disclosure. Although no known exploits are currently reported in the wild, the medium CVSS score of 5.5 reflects the moderate risk posed by this vulnerability. The absence of patches at the time of publication suggests that affected organizations should prioritize mitigation and monitoring until official fixes are released.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to environments where Android devices are shared among multiple users or where devices are used in multi-user contexts, such as corporate mobile devices, kiosks, or shared terminals. The information disclosure could lead to leakage of sensitive voicemail or notification data across user boundaries, potentially exposing confidential communications or personal information. This could result in privacy violations under GDPR regulations, leading to legal and reputational consequences. Although the attack requires local access, insider threats or compromised devices could exploit this flaw to gather sensitive data without detection. The lack of required user interaction facilitates automated or stealthy exploitation, increasing the risk in high-security environments. Organizations relying heavily on Android devices for communication or sensitive data handling should consider this vulnerability a moderate threat to confidentiality and take proactive steps to mitigate exposure.
Mitigation Recommendations
Given the absence of an official patch at the time of this report, European organizations should implement specific mitigations beyond generic advice: 1) Restrict physical and local access to Android devices, enforcing strict device usage policies and limiting multi-user access where possible. 2) Employ Mobile Device Management (MDM) solutions to monitor and control application permissions and user profiles, ensuring that voicemail and notification settings are not accessible across user boundaries. 3) Audit and restrict installation of untrusted or unnecessary applications that could exploit local vulnerabilities. 4) Educate users and administrators about the risks of local privilege escalation and data leakage, emphasizing the importance of device security. 5) Monitor device logs and behavior for unusual access patterns to voicemail or notification settings that could indicate exploitation attempts. 6) Prepare for prompt deployment of official patches from Google once available, including testing and rapid rollout procedures. 7) Consider isolating sensitive user profiles or employing containerization techniques on Android devices to minimize cross-user data exposure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- google_android
- Date Reserved
- 2025-05-22T18:10:57.282Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b9dcc588499799243c2f6b
Added to database: 9/4/2025, 6:39:01 PM
Last enriched: 9/11/2025, 8:29:13 PM
Last updated: 10/16/2025, 4:14:19 PM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11851: Cross Site Scripting in Apeman ID71
MediumCVE-2025-61540: n/a
MediumCVE-2025-22381: n/a
HighCVE-2025-9559: CWE-639: Authorization Bypass Through User-Controlled Key in Pegasystems Pega Infinity
MediumCVE-2025-11842: Path Traversal in Shazwazza Smidge
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.