Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48555: Information disclosure in Google Android

0
High
VulnerabilityCVE-2025-48555cvecve-2025-48555
Published: Mon Dec 08 2025 (12/08/2025, 16:57:03 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In multiple functions of NotificationStation.java, there is a possible cross-profile information disclosure due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 12/08/2025, 17:42:02 UTC

Technical Analysis

CVE-2025-48555 is a vulnerability identified in multiple functions within NotificationStation.java in the Android operating system versions 13 to 16. The root cause is a confused deputy problem, where the NotificationStation component improperly handles permissions or context, leading to unintended cross-profile information disclosure. This means that an attacker with local access to an Android device can leverage this flaw to access information from other user profiles on the same device without needing additional execution privileges or user interaction. The vulnerability enables a local escalation of privilege by bypassing normal profile isolation mechanisms, potentially exposing sensitive data across profiles. Since Android supports multiple user profiles, including work and personal profiles, this flaw undermines the security boundaries designed to separate data and applications. Although no public exploits have been reported yet, the vulnerability’s characteristics suggest it could be exploited by malicious apps or local attackers to gain unauthorized access to data. The absence of a CVSS score indicates that the vulnerability is newly published and awaiting further evaluation. The lack of required user interaction and no need for elevated privileges increase the risk profile. The vulnerability affects a broad range of Android versions currently in use, making it relevant for a large user base. NotificationStation.java is a core component related to notifications, which are integral to user interaction and system functionality, further emphasizing the importance of addressing this issue promptly.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality and integrity of data on Android devices, especially those used in corporate environments with multiple user profiles (e.g., BYOD scenarios or shared devices). Attackers with local access—such as malicious insiders, or malware that has gained limited local execution—could exploit this flaw to access sensitive information across profiles, potentially leaking corporate data or personal information. This could lead to data breaches, privacy violations, and compliance issues under regulations like GDPR. The vulnerability does not directly impact availability but could facilitate further attacks by exposing sensitive information. Given the widespread use of Android devices in Europe, including in government, healthcare, and enterprise sectors, the potential impact is broad. The lack of user interaction requirement increases the risk of stealthy exploitation. Organizations relying on Android devices for secure communications or data storage should consider this vulnerability a high priority for remediation.

Mitigation Recommendations

1. Monitor for official security advisories and apply Google’s security patches for Android versions 13 to 16 as soon as they become available. 2. Restrict physical and local access to Android devices, especially in environments where multiple user profiles exist. 3. Implement strict device management policies using Mobile Device Management (MDM) solutions to control app installations and permissions, reducing the risk of malicious local apps exploiting this vulnerability. 4. Educate users about the risks of installing untrusted applications and the importance of device security hygiene. 5. Where possible, limit the use of multiple user profiles on sensitive devices or segregate personal and work profiles using enterprise mobility solutions that enforce stronger isolation. 6. Conduct regular security audits and monitoring for anomalous local activity on Android devices. 7. Consider deploying endpoint detection and response (EDR) tools capable of detecting suspicious local privilege escalation attempts. 8. For highly sensitive environments, consider additional encryption or containerization of sensitive data to mitigate potential cross-profile leakage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:11:29.901Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6937057e52c2eb5957f2e592

Added to database: 12/8/2025, 5:06:06 PM

Last enriched: 12/8/2025, 5:42:02 PM

Last updated: 12/11/2025, 6:55:26 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats