Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48612: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-48612cvecve-2025-48612
Published: Mon Dec 08 2025 (12/08/2025, 16:57:32 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In multiple locations, there is a possible way for an application on a work profile to set the main user's default NFC payment setting due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 12/08/2025, 17:25:53 UTC

Technical Analysis

CVE-2025-48612 is a local elevation of privilege vulnerability affecting Google Android versions 13, 14, 15, and 16. The root cause is improper input validation in multiple locations within the Android framework that manage NFC payment settings. Specifically, an application running in a work profile environment can manipulate the main user's default NFC payment configuration without requiring additional execution privileges or user interaction. Work profiles are commonly used in enterprise environments to separate personal and corporate data and applications. This vulnerability allows a malicious app in the work profile to escalate privileges locally by altering NFC payment settings, potentially redirecting payments or bypassing user consent mechanisms. The lack of user interaction and no need for elevated privileges make this vulnerability particularly dangerous. Although no exploits have been reported in the wild, the vulnerability is publicly disclosed and could be targeted by attackers aiming to compromise mobile payment security. The absence of a CVSS score suggests the need for a manual severity assessment based on the impact on confidentiality, integrity, and availability, ease of exploitation, and scope of affected systems. Android's widespread use in Europe, especially in corporate environments with work profiles, increases the potential impact of this flaw.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity and security of NFC-based payment systems on Android devices. Attackers exploiting this flaw could manipulate payment settings to redirect transactions or enable unauthorized payments without user consent, leading to financial losses and reputational damage. Enterprises using Android work profiles to separate corporate and personal data could see increased risk of insider threats or malicious apps bypassing security controls. The vulnerability could also undermine trust in mobile payment technologies, affecting sectors such as retail, banking, and public services. Given the prevalence of Android devices in Europe and the growing adoption of NFC payments, the impact could be widespread, particularly in countries with high mobile payment usage. Additionally, the lack of user interaction required for exploitation means that attacks could occur stealthily, complicating detection and response efforts.

Mitigation Recommendations

Organizations should prioritize deploying security updates from Google as soon as patches become available for Android versions 13 through 16. Until patches are released, enterprises should enforce strict application vetting and permission controls within work profiles, limiting the installation of untrusted or unnecessary apps. Mobile device management (MDM) solutions should be configured to monitor and restrict changes to NFC payment settings, especially from work profile applications. User education should emphasize the risks of installing apps from unknown sources, even within work profiles. Additionally, organizations can consider temporarily disabling NFC payment features on devices with work profiles if feasible. Regular audits of device configurations and payment settings can help detect unauthorized changes. Collaboration with mobile security vendors to deploy behavioral detection tools that identify anomalous NFC configuration changes is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:12:23.625Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6937058352c2eb5957f2f0df

Added to database: 12/8/2025, 5:06:11 PM

Last enriched: 12/8/2025, 5:25:53 PM

Last updated: 12/11/2025, 7:08:33 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats