Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48531: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-48531cvecve-2025-48531
Published: Thu Sep 04 2025 (09/04/2025, 18:34:12 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In getCallingPackageName of CredentialStorage, there is a possible permission bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:50:31 UTC

Technical Analysis

CVE-2025-48531 is a vulnerability identified in the CredentialStorage component of Google Android versions 13 through 16. The flaw stems from a logic error in the getCallingPackageName method, which is responsible for determining the identity of the calling package. Due to this logic error, permission checks can be bypassed, allowing an attacker with local access to escalate their privileges without requiring additional execution privileges or user interaction. This elevation of privilege can enable attackers to gain unauthorized access to sensitive data, modify system settings, or disrupt system operations. The vulnerability is classified under CWE-693, which relates to protection mechanism failures due to logic errors. The CVSS v3.1 base score is 7.8, reflecting high severity with local attack vector, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the vulnerability poses a significant risk due to its ease of exploitation and broad impact on Android devices. The affected Android versions are widely deployed globally, making this a critical issue for mobile device security. No official patches were listed at the time of publication, emphasizing the need for vigilance and interim mitigations.

Potential Impact

The vulnerability allows local attackers to bypass permission checks and escalate privileges on affected Android devices, potentially gaining unauthorized access to sensitive information, modifying or deleting data, and disrupting device functionality. This can compromise user privacy and device integrity, enabling further attacks such as installing persistent malware or accessing protected credentials. Since exploitation does not require user interaction or additional privileges, any local user or malicious app with limited permissions could leverage this flaw, increasing the attack surface. Organizations relying on Android devices for sensitive communications or operations face risks of data breaches and operational disruptions. The broad deployment of affected Android versions means millions of devices worldwide could be impacted, affecting both consumer and enterprise environments.

Mitigation Recommendations

1. Monitor official Google Android security advisories for patches addressing CVE-2025-48531 and apply them promptly once available. 2. Until patches are released, restrict local device access to trusted users only and enforce strong device lock mechanisms (PIN, password, biometrics) to prevent unauthorized local access. 3. Limit installation of apps from untrusted sources to reduce the risk of malicious apps exploiting this vulnerability. 4. Employ mobile device management (MDM) solutions to enforce security policies and monitor for suspicious privilege escalation attempts. 5. Regularly audit device permissions and running processes to detect anomalous behavior indicative of exploitation. 6. Educate users about the risks of granting unnecessary permissions to apps and the importance of keeping devices updated. 7. Consider disabling or restricting CredentialStorage access where feasible as a temporary mitigation if supported by device configuration.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:10:57.282Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9dcc588499799243c2f6f

Added to database: 9/4/2025, 6:39:01 PM

Last enriched: 2/27/2026, 2:50:31 AM

Last updated: 3/25/2026, 6:08:32 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses