CVE-2025-48586: Elevation of privilege in Google Android
In onActivityResult of EditFdnContactScreen.java, there is a possible way to leak contacts from the work profile due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
AI Analysis
Technical Summary
CVE-2025-48586 is a vulnerability identified in Google Android versions 15 and 16, specifically within the onActivityResult method of the EditFdnContactScreen.java component. The flaw is categorized as a confused deputy problem (CWE-441), where the application improperly handles permissions, allowing an attacker to leak contacts from the work profile. This leakage occurs without requiring additional execution privileges or user interaction, making it a local elevation of privilege vulnerability. The work profile is designed to separate personal and corporate data on Android devices, and unauthorized access to this data compromises confidentiality and potentially integrity. The vulnerability's CVSS 3.1 score of 7.8 reflects its high severity, with impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to environments where Android devices are used for work purposes, especially in enterprise and BYOD scenarios. The lack of available patches at the time of publication necessitates proactive mitigation strategies.
Potential Impact
For European organizations, this vulnerability threatens the confidentiality of sensitive corporate contact information stored in Android work profiles. Unauthorized access could lead to data leakage, espionage, or further lateral movement within corporate networks. The integrity of contact data could be compromised, potentially disrupting communication channels. Availability impacts arise if exploitation leads to denial of service or system instability. Organizations relying heavily on Android devices for enterprise mobility, especially those with integrated work profiles, face increased risk. The vulnerability could undermine trust in mobile device management (MDM) solutions and complicate compliance with data protection regulations such as GDPR, given the potential exposure of personal and corporate data. The local nature of the exploit means attackers need physical or local access, but the absence of user interaction requirements lowers the barrier for exploitation by malicious insiders or compromised apps.
Mitigation Recommendations
Organizations should prioritize updating Android devices to patched versions once available from Google. Until patches are released, restrict local access to devices, enforce strong device lock policies, and limit installation of untrusted applications that could exploit this vulnerability. Employ mobile device management (MDM) solutions to enforce strict separation between personal and work profiles and monitor for anomalous access patterns to contact data. Educate users about the risks of installing unknown apps and the importance of device security. Consider disabling or limiting work profile features if not essential. Regularly audit device configurations and permissions related to contact access. Implement endpoint detection and response (EDR) tools capable of identifying suspicious local privilege escalation attempts. Coordinate with vendors and security teams to stay informed about patch releases and emerging exploit reports.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2025-48586: Elevation of privilege in Google Android
Description
In onActivityResult of EditFdnContactScreen.java, there is a possible way to leak contacts from the work profile due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2025-48586 is a vulnerability identified in Google Android versions 15 and 16, specifically within the onActivityResult method of the EditFdnContactScreen.java component. The flaw is categorized as a confused deputy problem (CWE-441), where the application improperly handles permissions, allowing an attacker to leak contacts from the work profile. This leakage occurs without requiring additional execution privileges or user interaction, making it a local elevation of privilege vulnerability. The work profile is designed to separate personal and corporate data on Android devices, and unauthorized access to this data compromises confidentiality and potentially integrity. The vulnerability's CVSS 3.1 score of 7.8 reflects its high severity, with impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to environments where Android devices are used for work purposes, especially in enterprise and BYOD scenarios. The lack of available patches at the time of publication necessitates proactive mitigation strategies.
Potential Impact
For European organizations, this vulnerability threatens the confidentiality of sensitive corporate contact information stored in Android work profiles. Unauthorized access could lead to data leakage, espionage, or further lateral movement within corporate networks. The integrity of contact data could be compromised, potentially disrupting communication channels. Availability impacts arise if exploitation leads to denial of service or system instability. Organizations relying heavily on Android devices for enterprise mobility, especially those with integrated work profiles, face increased risk. The vulnerability could undermine trust in mobile device management (MDM) solutions and complicate compliance with data protection regulations such as GDPR, given the potential exposure of personal and corporate data. The local nature of the exploit means attackers need physical or local access, but the absence of user interaction requirements lowers the barrier for exploitation by malicious insiders or compromised apps.
Mitigation Recommendations
Organizations should prioritize updating Android devices to patched versions once available from Google. Until patches are released, restrict local access to devices, enforce strong device lock policies, and limit installation of untrusted applications that could exploit this vulnerability. Employ mobile device management (MDM) solutions to enforce strict separation between personal and work profiles and monitor for anomalous access patterns to contact data. Educate users about the risks of installing unknown apps and the importance of device security. Consider disabling or limiting work profile features if not essential. Regularly audit device configurations and permissions related to contact access. Implement endpoint detection and response (EDR) tools capable of identifying suspicious local privilege escalation attempts. Coordinate with vendors and security teams to stay informed about patch releases and emerging exploit reports.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- google_android
- Date Reserved
- 2025-05-22T18:11:57.727Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6937057f52c2eb5957f2e5f7
Added to database: 12/8/2025, 5:06:07 PM
Last enriched: 12/17/2025, 4:47:17 PM
Last updated: 2/6/2026, 2:40:11 AM
Views: 106
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1974: Denial of Service in Free5GC
MediumCVE-2026-1973: NULL Pointer Dereference in Free5GC
MediumCVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.