Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48567: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-48567cvecve-2025-48567
Published: Mon Mar 02 2026 (03/02/2026, 18:42:00 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In multiple locations, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 17:03:21 UTC

Technical Analysis

CVE-2025-48567 is a vulnerability affecting Google Android versions 14 through 16, involving an elevation of privilege through a bypass of file path filtering mechanisms. The root cause is incorrect Unicode normalization, which allows attackers to craft file paths that evade security filters designed to restrict access to sensitive directories. This flaw enables a local attacker, who already has limited access, to escalate privileges without requiring additional execution rights. The vulnerability requires user interaction, such as opening a malicious file or link, to trigger the exploit. The issue is categorized under CWE-22, indicating a path traversal weakness. The CVSS v3.1 score of 7.8 reflects high severity, with impacts on confidentiality, integrity, and availability. Although no public exploits have been reported, the vulnerability poses a significant risk due to the widespread use of affected Android versions and the critical nature of the privilege escalation. The lack of available patches at the time of publication increases the urgency for mitigation.

Potential Impact

If exploited, this vulnerability allows attackers to bypass file path restrictions and gain elevated privileges on affected Android devices. This can lead to unauthorized access to sensitive data, modification or deletion of critical system files, and potential disruption of device functionality. The compromise of confidentiality, integrity, and availability could facilitate further attacks, including installation of persistent malware or spying on users. Given the ubiquity of Android devices globally, the impact extends to millions of users and organizations relying on these devices for communication and business operations. The requirement for user interaction limits remote exploitation but does not eliminate risk, especially in targeted phishing or social engineering campaigns. The absence of known exploits currently provides a window for remediation before widespread abuse occurs.

Mitigation Recommendations

Organizations and users should prioritize updating to patched Android versions once available from Google or device manufacturers. Until patches are released, users should exercise caution with unsolicited files, links, or apps, especially from untrusted sources. Employing mobile device management (MDM) solutions can help enforce security policies and restrict installation of unverified applications. Developers and security teams should audit file path handling and Unicode normalization processes in their applications to prevent similar bypasses. Additionally, enabling strong endpoint protection and monitoring for unusual local privilege escalation attempts can aid in early detection. Security awareness training focused on phishing and social engineering can reduce the likelihood of user interaction-based exploitation. Vendors should expedite patch development and communicate clear guidance to users and administrators.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:11:40.405Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a5db79d1a09e29cb1c9ad5

Added to database: 3/2/2026, 6:48:25 PM

Last enriched: 3/10/2026, 5:03:21 PM

Last updated: 4/15/2026, 6:19:30 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses