Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48610: Information disclosure in Google Android

0
Medium
VulnerabilityCVE-2025-48610cvecve-2025-48610
Published: Mon Dec 08 2025 (12/08/2025, 16:57:31 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In __pkvm_guest_relinquish_to_host of mem_protect.c, there is a possible configuration data leak due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 12/08/2025, 17:26:07 UTC

Technical Analysis

CVE-2025-48610 is a vulnerability identified in the Android kernel's mem_protect.c file, specifically within the __pkvm_guest_relinquish_to_host function. The issue stems from a logic error that leads to a possible leak of configuration data. This leak constitutes an information disclosure vulnerability that can be exploited locally without requiring any additional execution privileges or user interaction. The flaw allows an attacker with local access to the device to obtain sensitive configuration information that could potentially be used to facilitate further attacks or compromise user privacy. The vulnerability affects the Android kernel, which is a critical component of the operating system responsible for managing hardware and system resources. Since the kernel operates at a low level, any information leakage here can have significant implications. No CVSS score has been assigned yet, and no public exploits are known at this time. The vulnerability was reserved in May 2025 and published in December 2025, indicating recent discovery and disclosure. The absence of required user interaction and elevated privileges means that any local user or malicious app with local access could exploit this flaw. However, remote exploitation is not indicated, limiting the attack vector to local access scenarios. The vulnerability's root cause is a logic error, which suggests a coding or design flaw in how the kernel handles relinquishing control from the guest to the host in the protected kernel virtual machine (pkvm) environment. This environment is related to virtualization and memory protection features in the Android kernel. The leak of configuration data could expose sensitive system parameters or security settings, potentially aiding attackers in crafting more effective exploits or bypassing security controls.

Potential Impact

For European organizations, the primary impact of CVE-2025-48610 lies in the potential compromise of confidentiality due to local information disclosure. Organizations relying heavily on Android devices, especially those with sensitive or classified data stored or processed on these devices, could face risks if attackers gain local access. The vulnerability does not directly affect system integrity or availability but could serve as a stepping stone for privilege escalation or further attacks if combined with other vulnerabilities. The lack of required user interaction and no need for additional privileges increases the risk from insider threats or malicious applications already installed on devices. Given the widespread use of Android devices in Europe for both personal and professional purposes, this vulnerability could affect mobile workforce security, particularly in sectors like finance, government, and critical infrastructure. The impact is somewhat mitigated by the local access requirement, meaning remote attackers cannot exploit this vulnerability directly. However, in environments where devices are shared, lost, or physically accessible to attackers, the risk is more pronounced. The absence of known exploits in the wild reduces immediate threat levels but does not eliminate the potential for future exploitation once details become widely known.

Mitigation Recommendations

To mitigate CVE-2025-48610, European organizations should prioritize the following actions: 1) Monitor for and apply official security patches from Google and device manufacturers as soon as they are released, as patching the kernel is critical to closing this vulnerability. 2) Restrict local access to Android devices by enforcing strong physical security controls, including device lock policies, secure boot, and encryption to prevent unauthorized users from gaining local access. 3) Implement mobile device management (MDM) solutions to control app installations and monitor for suspicious local activity that could indicate exploitation attempts. 4) Educate users on the risks of installing untrusted applications or granting excessive permissions that could facilitate local exploitation. 5) For high-security environments, consider disabling or limiting virtualization features related to pkvm if not required, reducing the attack surface. 6) Conduct regular security audits and vulnerability assessments on Android devices to detect potential exploitation or configuration weaknesses. 7) Coordinate with vendors to ensure timely updates and verify that devices in use are running supported and patched kernel versions. These steps go beyond generic advice by focusing on controlling local access, managing device configurations, and leveraging organizational policies to reduce exploitation risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:12:16.422Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6937058352c2eb5957f2f0da

Added to database: 12/8/2025, 5:06:11 PM

Last enriched: 12/8/2025, 5:26:07 PM

Last updated: 12/9/2025, 4:05:55 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats