Skip to main content

CVE-2025-48550: Denial of service in Google Android

Medium
VulnerabilityCVE-2025-48550cvecve-2025-48550
Published: Thu Sep 04 2025 (09/04/2025, 18:34:29 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In testGrantSlicePermission of SliceManagerTest.java, there is a possible permanent denial of service due to a path traversal error. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 09/04/2025, 18:56:48 UTC

Technical Analysis

CVE-2025-48550 is a vulnerability identified in the Android operating system, specifically affecting versions 13 through 16. The flaw resides in the testGrantSlicePermission method within SliceManagerTest.java, where a path traversal error can be exploited. This vulnerability allows an attacker to cause a permanent denial of service (DoS) condition locally on the device. The path traversal issue likely enables the attacker to manipulate file system paths in a way that disrupts normal operation of the SliceManager component, potentially corrupting or deleting critical files or resources. Importantly, exploitation does not require any additional execution privileges or user interaction, meaning that an unprivileged local attacker or malicious app could trigger the DoS without prompting the user. The vulnerability is local, so remote exploitation is not indicated, and no known exploits are currently reported in the wild. The lack of a CVSS score suggests this is a newly published issue, but the permanent DoS impact and ease of exploitation make it significant. The vulnerability affects multiple recent Android versions, which are widely deployed globally, including across Europe.

Potential Impact

For European organizations, the impact of CVE-2025-48550 can be substantial, especially for enterprises relying on Android devices for critical business functions. A permanent denial of service on Android devices could disrupt employee productivity, cause loss of access to essential applications, and require device reimaging or replacement. In sectors such as finance, healthcare, and public services where mobile device availability is crucial, this could lead to operational delays and increased support costs. Additionally, organizations with Bring Your Own Device (BYOD) policies may face increased risk as unprivileged local attackers or malicious apps could exploit this vulnerability without user interaction. Although the vulnerability does not provide privilege escalation or remote exploitation, the ability to cause permanent device unavailability locally could be leveraged in targeted attacks or insider threat scenarios. The absence of known exploits in the wild currently reduces immediate risk, but the vulnerability’s presence in multiple Android versions means a broad attack surface exists.

Mitigation Recommendations

To mitigate CVE-2025-48550, organizations should prioritize updating Android devices to patched versions as soon as Google releases a fix. Until patches are available, organizations should restrict installation of untrusted or third-party applications that could exploit local vulnerabilities. Implementing Mobile Device Management (MDM) solutions can help enforce application whitelisting and monitor device health for signs of DoS conditions. Additionally, educating users about the risks of installing apps from unknown sources can reduce exposure. For critical environments, consider isolating Android devices from sensitive networks or limiting local access to trusted users only. Monitoring device logs for abnormal SliceManager behavior or file system errors related to path traversal attempts may provide early detection. Finally, vendors and developers should review and harden path handling in SliceManager and related components to prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:11:18.277Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9dcc688499799243c2fd0

Added to database: 9/4/2025, 6:39:02 PM

Last enriched: 9/4/2025, 6:56:48 PM

Last updated: 9/5/2025, 5:38:53 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats