Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48541: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-48541cvecve-2025-48541
Published: Thu Sep 04 2025 (09/04/2025, 18:34:20 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In onCreate of FaceSettings.java, there is a possible way to remove biometric unlock across user profiles due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/11/2025, 20:26:36 UTC

Technical Analysis

CVE-2025-48541 is a high-severity local privilege escalation vulnerability affecting Google Android versions 13 through 16. The flaw exists in the FaceSettings.java component, specifically within the onCreate method, where improper input validation allows an attacker to remove biometric unlock capabilities across user profiles. This vulnerability stems from CWE-20, indicating insufficient input validation. Exploitation does not require user interaction or additional execution privileges beyond those of the local user, making it a potent vector for privilege escalation. By exploiting this flaw, a local attacker can elevate their privileges, potentially gaining access to restricted biometric authentication settings and bypassing security controls tied to biometric unlock features. The vulnerability impacts confidentiality, integrity, and availability, as it can lead to unauthorized access and modification of biometric settings, undermining device security. Although no known exploits are currently reported in the wild, the vulnerability's characteristics and high CVSS score (7.8) underscore the urgency for remediation. The lack of a publicly available patch at the time of disclosure necessitates proactive mitigation strategies by affected users and organizations.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for enterprises relying on Android devices for secure authentication and access control. The ability to remove biometric unlock across user profiles can lead to unauthorized access to sensitive corporate data and systems, potentially facilitating lateral movement within networks. This is particularly concerning for sectors with stringent data protection requirements, such as finance, healthcare, and government agencies. The local nature of the exploit means that physical or local access to devices is required, which could be leveraged in scenarios involving lost or stolen devices or insider threats. The compromise of biometric authentication undermines trust in device security, potentially leading to data breaches and compliance violations under regulations like GDPR. Additionally, the impact on device availability and integrity could disrupt business operations reliant on secure mobile platforms.

Mitigation Recommendations

Given the absence of an official patch at the time of this report, European organizations should implement layered mitigation strategies. First, enforce strict physical security controls to limit unauthorized local access to Android devices, including secure storage and device tracking. Second, restrict the use of biometric authentication to trusted users and consider disabling biometric unlock temporarily on devices in high-risk environments until patches are available. Third, implement mobile device management (MDM) solutions to monitor device configurations and detect unauthorized changes to biometric settings. Fourth, educate users about the risks of local privilege escalation and the importance of reporting lost or stolen devices promptly. Finally, maintain vigilance for updates from Google and apply security patches immediately upon release to remediate the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:11:09.315Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9dcc688499799243c2f9a

Added to database: 9/4/2025, 6:39:02 PM

Last enriched: 9/11/2025, 8:26:36 PM

Last updated: 10/19/2025, 12:59:15 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats