Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48612: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-48612cvecve-2025-48612
Published: Mon Dec 08 2025 (12/08/2025, 16:57:32 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In multiple locations, there is a possible way for an application on a work profile to set the main user's default NFC payment setting due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 12/17/2025, 16:51:00 UTC

Technical Analysis

CVE-2025-48612 is a vulnerability identified in Google Android operating system versions 13, 14, 15, and 16 that allows an application running within a work profile to escalate privileges locally by modifying the main user's default NFC payment settings. The root cause is improper input validation in multiple locations within the Android framework managing NFC payment configurations. Specifically, the vulnerability enables a malicious app confined to a work profile—typically used to separate corporate data and applications from personal data—to bypass security boundaries and alter NFC payment settings of the primary user profile. This can lead to unauthorized changes in payment configurations, potentially allowing fraudulent transactions or exposure of sensitive payment data. The exploit requires no additional execution privileges beyond those granted to the app in the work profile and does not require any user interaction, making it easier to exploit once the malicious app is installed. The vulnerability is categorized under CWE-20 (Improper Input Validation), indicating that the system fails to properly validate or sanitize input data before processing. The CVSS v3.1 base score is 7.8, reflecting high severity with metrics AV:L (local attack vector), AC:L (low attack complexity), PR:L (low privileges required), UI:N (no user interaction), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits have been reported in the wild yet, the vulnerability poses a significant risk to Android users, especially in enterprise environments where work profiles are commonly used to separate corporate and personal data. The lack of user interaction requirement and the ability to escalate privileges locally make this vulnerability particularly dangerous for organizations relying on Android devices for secure NFC payments and mobile work environments.

Potential Impact

For European organizations, this vulnerability presents a critical risk to mobile device security, particularly in enterprises that utilize Android work profiles to segregate corporate and personal data. The ability for a work profile app to alter the main user's NFC payment settings could lead to unauthorized financial transactions, data leakage, or manipulation of payment configurations, undermining trust in mobile payment systems. This could result in financial losses, regulatory non-compliance (e.g., GDPR implications if payment data is compromised), and reputational damage. The vulnerability affects confidentiality, integrity, and availability of NFC payment services on affected devices. Since no user interaction is required and the exploit can be performed locally with low privileges, attackers could deploy malicious apps through enterprise app stores or phishing campaigns targeting employees. The impact is heightened in sectors with high mobile payment usage such as banking, retail, and public services. Additionally, organizations with Bring Your Own Device (BYOD) policies are at increased risk due to the mixing of personal and corporate profiles. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score necessitates urgent attention.

Mitigation Recommendations

1. Monitor for and apply official security patches from Google as soon as they become available for Android versions 13 through 16. 2. Until patches are released, restrict installation of apps in work profiles to trusted sources only, such as enterprise-managed app stores, and enforce strict app vetting policies. 3. Implement Mobile Device Management (MDM) solutions to control and audit NFC payment settings and app permissions within work profiles. 4. Educate employees about the risks of installing unauthorized apps in work profiles and the importance of reporting suspicious behavior. 5. Regularly audit NFC payment configurations on corporate-managed devices to detect unauthorized changes. 6. Consider disabling NFC payment features in work profiles if not essential for business operations. 7. Employ behavioral monitoring tools to detect anomalous app activities related to payment settings. 8. Coordinate with payment service providers to monitor for unusual transaction patterns that could indicate exploitation. 9. Review and tighten policies governing work profile app permissions, especially those related to NFC and payment services. 10. Prepare incident response plans specifically addressing potential exploitation of this vulnerability to enable rapid containment and remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:12:23.625Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6937058352c2eb5957f2f0df

Added to database: 12/8/2025, 5:06:11 PM

Last enriched: 12/17/2025, 4:51:00 PM

Last updated: 2/4/2026, 4:23:02 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats