Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48614: Denial of service in Google Android

0
Medium
VulnerabilityCVE-2025-48614cvecve-2025-48614
Published: Mon Dec 08 2025 (12/08/2025, 16:57:34 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In rebootWipeUserData of RecoverySystem.java, there is a possible way to factory reset the device while in DSU mode due to a missing permission check. This could lead to physical denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 12/08/2025, 17:25:40 UTC

Technical Analysis

CVE-2025-48614 is a denial of service vulnerability affecting Google Android versions 13 through 16. The issue resides in the rebootWipeUserData method within RecoverySystem.java, where a missing permission check allows an attacker to initiate a factory reset while the device is operating in Dynamic System Updates (DSU) mode. DSU mode is a feature that enables users and developers to load and test new Android system images without modifying the device's primary system partition. Due to the lack of proper permission validation, an attacker can invoke this function to wipe user data forcibly, causing a physical denial of service by rendering the device unusable until it is reconfigured. Notably, exploitation does not require any additional execution privileges or user interaction, which lowers the barrier for attackers to disrupt devices. Although no exploits have been observed in the wild, the vulnerability poses a significant risk to device availability, particularly in environments where DSU mode is enabled or used for testing. The absence of a CVSS score indicates that this vulnerability is newly disclosed, but the technical details suggest a high impact on availability with straightforward exploitation.

Potential Impact

For European organizations, this vulnerability could lead to significant operational disruptions, especially for enterprises relying heavily on Android devices for daily business operations, mobile workforce management, or development and testing environments using DSU mode. The forced factory reset wipes all user data, leading to loss of critical information, downtime, and potential costs associated with device reconfiguration and data recovery. Sectors such as finance, healthcare, and government, which often use Android devices for secure communications and field operations, may face increased risks of service interruptions. Additionally, organizations using mobile device management (MDM) solutions that enable DSU mode for testing updates or custom images could inadvertently expose themselves to this threat. The lack of required authentication or user interaction means that remote or local attackers with access to the device could exploit this vulnerability easily, amplifying the risk of widespread denial of service incidents.

Mitigation Recommendations

Organizations should prioritize applying official patches from Google as soon as they become available to address the missing permission check in rebootWipeUserData. Until patches are deployed, it is advisable to restrict or disable DSU mode usage on corporate devices, especially those used in sensitive or critical environments. Mobile Device Management (MDM) policies should be reviewed and updated to prevent unauthorized activation of DSU mode or factory reset commands. Monitoring device logs for unexpected reboot or wipe commands can help detect potential exploitation attempts. Additionally, organizations should educate users and administrators about the risks associated with DSU mode and enforce strict access controls to devices to minimize the risk of local exploitation. For development teams, isolating test devices from production environments can reduce the impact of potential attacks leveraging this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:12:23.625Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6937058352c2eb5957f2f0e3

Added to database: 12/8/2025, 5:06:11 PM

Last enriched: 12/8/2025, 5:25:40 PM

Last updated: 12/9/2025, 5:41:40 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats