CVE-2025-48555: Information disclosure in Google Android
In multiple functions of NotificationStation.java, there is a possible cross-profile information disclosure due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
AI Analysis
Technical Summary
CVE-2025-48555 is a vulnerability identified in multiple functions within the NotificationStation.java component of Google Android versions 13 through 16. The root cause is a confused deputy scenario, where the NotificationStation component improperly handles cross-profile data, leading to unauthorized information disclosure between user profiles on the same device. This flaw allows a local attacker with limited privileges to escalate their access rights without needing additional execution privileges or user interaction, making exploitation feasible by any local app or process with minimal permissions. The vulnerability affects confidentiality by exposing sensitive information across profiles, integrity by enabling privilege escalation, and availability by potentially disrupting normal notification services. The CVSS 3.1 score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) indicates a high-severity issue with low attack complexity and no user interaction required. Although no public exploits have been reported, the vulnerability's characteristics suggest it could be leveraged for stealthy local attacks, especially on multi-user or work profile-enabled devices. The CWE-441 classification highlights the information disclosure nature due to improper access control. The lack of available patches at the time of publication necessitates immediate attention from security teams to monitor updates and prepare mitigation strategies.
Potential Impact
The vulnerability poses a significant risk to organizations and individuals using affected Android versions (13-16). It enables local attackers to bypass profile isolation, potentially accessing sensitive data from other user profiles, including work profiles or restricted accounts. This can lead to data leakage of confidential information, unauthorized privilege escalation, and disruption of device functionality. For enterprises employing Android devices with multiple profiles for security or management purposes, this flaw undermines the security boundary between profiles, increasing the risk of insider threats or malicious apps gaining elevated access. The absence of required user interaction facilitates automated or stealthy exploitation, raising the likelihood of unnoticed compromise. The impact extends to mobile device management, secure communications, and any scenario relying on profile separation for security. Given Android's widespread adoption globally, the vulnerability could affect millions of devices, potentially impacting sectors such as finance, healthcare, government, and critical infrastructure where mobile security is paramount.
Mitigation Recommendations
Organizations should immediately inventory Android devices running versions 13 through 16 and restrict installation of untrusted or unnecessary local applications to minimize attack surface. Employ strict app permission policies and leverage mobile device management (MDM) solutions to enforce profile separation and monitor for anomalous behavior indicative of privilege escalation attempts. Until official patches are released by Google, consider disabling or limiting multi-profile usage where feasible to reduce exposure. Regularly monitor security advisories from Google and apply updates promptly once available. Implement runtime application self-protection (RASP) or endpoint detection and response (EDR) tools capable of detecting suspicious local privilege escalation activities. Educate users on the risks of installing apps from unknown sources and enforce the use of verified app stores. For high-security environments, consider additional sandboxing or containerization strategies to isolate sensitive profiles further. Finally, conduct thorough security audits and penetration testing focused on local privilege escalation vectors to identify and remediate potential exploitation paths.
Affected Countries
United States, India, Brazil, Indonesia, Russia, Germany, United Kingdom, France, Japan, South Korea, Mexico, Italy, Canada, Australia
CVE-2025-48555: Information disclosure in Google Android
Description
In multiple functions of NotificationStation.java, there is a possible cross-profile information disclosure due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-48555 is a vulnerability identified in multiple functions within the NotificationStation.java component of Google Android versions 13 through 16. The root cause is a confused deputy scenario, where the NotificationStation component improperly handles cross-profile data, leading to unauthorized information disclosure between user profiles on the same device. This flaw allows a local attacker with limited privileges to escalate their access rights without needing additional execution privileges or user interaction, making exploitation feasible by any local app or process with minimal permissions. The vulnerability affects confidentiality by exposing sensitive information across profiles, integrity by enabling privilege escalation, and availability by potentially disrupting normal notification services. The CVSS 3.1 score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) indicates a high-severity issue with low attack complexity and no user interaction required. Although no public exploits have been reported, the vulnerability's characteristics suggest it could be leveraged for stealthy local attacks, especially on multi-user or work profile-enabled devices. The CWE-441 classification highlights the information disclosure nature due to improper access control. The lack of available patches at the time of publication necessitates immediate attention from security teams to monitor updates and prepare mitigation strategies.
Potential Impact
The vulnerability poses a significant risk to organizations and individuals using affected Android versions (13-16). It enables local attackers to bypass profile isolation, potentially accessing sensitive data from other user profiles, including work profiles or restricted accounts. This can lead to data leakage of confidential information, unauthorized privilege escalation, and disruption of device functionality. For enterprises employing Android devices with multiple profiles for security or management purposes, this flaw undermines the security boundary between profiles, increasing the risk of insider threats or malicious apps gaining elevated access. The absence of required user interaction facilitates automated or stealthy exploitation, raising the likelihood of unnoticed compromise. The impact extends to mobile device management, secure communications, and any scenario relying on profile separation for security. Given Android's widespread adoption globally, the vulnerability could affect millions of devices, potentially impacting sectors such as finance, healthcare, government, and critical infrastructure where mobile security is paramount.
Mitigation Recommendations
Organizations should immediately inventory Android devices running versions 13 through 16 and restrict installation of untrusted or unnecessary local applications to minimize attack surface. Employ strict app permission policies and leverage mobile device management (MDM) solutions to enforce profile separation and monitor for anomalous behavior indicative of privilege escalation attempts. Until official patches are released by Google, consider disabling or limiting multi-profile usage where feasible to reduce exposure. Regularly monitor security advisories from Google and apply updates promptly once available. Implement runtime application self-protection (RASP) or endpoint detection and response (EDR) tools capable of detecting suspicious local privilege escalation activities. Educate users on the risks of installing apps from unknown sources and enforce the use of verified app stores. For high-security environments, consider additional sandboxing or containerization strategies to isolate sensitive profiles further. Finally, conduct thorough security audits and penetration testing focused on local privilege escalation vectors to identify and remediate potential exploitation paths.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- google_android
- Date Reserved
- 2025-05-22T18:11:29.901Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6937057e52c2eb5957f2e592
Added to database: 12/8/2025, 5:06:06 PM
Last enriched: 2/27/2026, 5:16:42 AM
Last updated: 3/26/2026, 8:26:34 AM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.