Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48586: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-48586cvecve-2025-48586
Published: Mon Dec 08 2025 (12/08/2025, 16:57:15 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In onActivityResult of EditFdnContactScreen.java, there is a possible way to leak contacts from the work profile due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 12/17/2025, 16:47:17 UTC

Technical Analysis

CVE-2025-48586 is a vulnerability identified in Google Android versions 15 and 16, specifically within the onActivityResult method of the EditFdnContactScreen.java component. The flaw is categorized as a confused deputy problem (CWE-441), where the application improperly handles permissions, allowing an attacker to leak contacts from the work profile. This leakage occurs without requiring additional execution privileges or user interaction, making it a local elevation of privilege vulnerability. The work profile is designed to separate personal and corporate data on Android devices, and unauthorized access to this data compromises confidentiality and potentially integrity. The vulnerability's CVSS 3.1 score of 7.8 reflects its high severity, with impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to environments where Android devices are used for work purposes, especially in enterprise and BYOD scenarios. The lack of available patches at the time of publication necessitates proactive mitigation strategies.

Potential Impact

For European organizations, this vulnerability threatens the confidentiality of sensitive corporate contact information stored in Android work profiles. Unauthorized access could lead to data leakage, espionage, or further lateral movement within corporate networks. The integrity of contact data could be compromised, potentially disrupting communication channels. Availability impacts arise if exploitation leads to denial of service or system instability. Organizations relying heavily on Android devices for enterprise mobility, especially those with integrated work profiles, face increased risk. The vulnerability could undermine trust in mobile device management (MDM) solutions and complicate compliance with data protection regulations such as GDPR, given the potential exposure of personal and corporate data. The local nature of the exploit means attackers need physical or local access, but the absence of user interaction requirements lowers the barrier for exploitation by malicious insiders or compromised apps.

Mitigation Recommendations

Organizations should prioritize updating Android devices to patched versions once available from Google. Until patches are released, restrict local access to devices, enforce strong device lock policies, and limit installation of untrusted applications that could exploit this vulnerability. Employ mobile device management (MDM) solutions to enforce strict separation between personal and work profiles and monitor for anomalous access patterns to contact data. Educate users about the risks of installing unknown apps and the importance of device security. Consider disabling or limiting work profile features if not essential. Regularly audit device configurations and permissions related to contact access. Implement endpoint detection and response (EDR) tools capable of identifying suspicious local privilege escalation attempts. Coordinate with vendors and security teams to stay informed about patch releases and emerging exploit reports.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:11:57.727Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6937057f52c2eb5957f2e5f7

Added to database: 12/8/2025, 5:06:07 PM

Last enriched: 12/17/2025, 4:47:17 PM

Last updated: 2/6/2026, 2:40:11 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats