Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48587: Denial of service in Google Android

0
Medium
VulnerabilityCVE-2025-48587cvecve-2025-48587
Published: Mon Mar 02 2026 (03/02/2026, 18:42:11 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In multiple functions of ProfilingService.java, there is a possible persistent denial of service due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 03/02/2026, 19:22:17 UTC

Technical Analysis

CVE-2025-48587 is a denial of service vulnerability found in Google Android version 16, specifically within multiple functions of the ProfilingService.java component. The root cause is improper input validation, which allows crafted inputs to cause persistent denial of service conditions. This vulnerability can be exploited locally without requiring any additional execution privileges or user interaction, meaning an attacker with local access to the device can trigger the DoS condition reliably. The persistent nature of the DoS suggests that the service or system component may crash or become unresponsive until a reboot or manual intervention occurs. ProfilingService.java is likely involved in performance or diagnostic profiling tasks, so its disruption could affect system monitoring or performance management features. No CVSS score has been assigned yet, and no known exploits have been reported in the wild, indicating it may be a recently discovered issue. The lack of patch links suggests that a fix is either pending or not yet publicly released. The vulnerability's exploitation scope is limited to devices running Android 16, but given Android's widespread use, the affected population could be significant. The absence of required user interaction and privileges lowers the barrier for exploitation, increasing the risk of local attackers causing service outages on affected devices.

Potential Impact

The primary impact of CVE-2025-48587 is a persistent denial of service on affected Android 16 devices. This can lead to service crashes or system instability, potentially disrupting critical device functions and user experience. Organizations relying on Android devices for business operations, especially those using version 16, may face operational disruptions if attackers exploit this vulnerability. The denial of service could affect device availability, impacting mobile workforce productivity, communication, and access to enterprise applications. Although the attack requires local access, this could be achieved through physical access or via other local compromise methods, increasing the risk in environments with shared or less secure device usage. The vulnerability does not lead to privilege escalation or data confidentiality breaches directly, but the availability impact alone can be significant, especially in sectors relying heavily on mobile devices such as healthcare, finance, and government. The lack of known exploits currently reduces immediate risk but does not eliminate the potential for future exploitation once details become widely known.

Mitigation Recommendations

To mitigate CVE-2025-48587, organizations should prioritize updating Android devices to patched versions once Google releases a fix. Until patches are available, restrict local access to devices by enforcing strong physical security controls and limiting device sharing. Employ mobile device management (MDM) solutions to monitor device health and detect abnormal service crashes or instability that could indicate exploitation attempts. Disable or restrict ProfilingService functionality if feasible and if it does not impact critical operations, as a temporary workaround. Educate users and administrators about the risks of local access vulnerabilities and enforce policies to prevent unauthorized physical or local network access to devices. Regularly audit devices for unusual behavior and maintain up-to-date backups to recover quickly from potential denial of service conditions. Collaborate with vendors and security communities to stay informed about patch releases and emerging exploit information. Avoid installing untrusted applications that could leverage local access to trigger the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:11:57.727Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a5db7cd1a09e29cb1cadc7

Added to database: 3/2/2026, 6:48:28 PM

Last enriched: 3/2/2026, 7:22:17 PM

Last updated: 3/3/2026, 6:02:15 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses