Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48614: Denial of service in Google Android

0
Medium
VulnerabilityCVE-2025-48614cvecve-2025-48614
Published: Mon Dec 08 2025 (12/08/2025, 16:57:34 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In rebootWipeUserData of RecoverySystem.java, there is a possible way to factory reset the device while in DSU mode due to a missing permission check. This could lead to physical denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 12/17/2025, 16:51:15 UTC

Technical Analysis

CVE-2025-48614 is a vulnerability identified in the Android operating system, specifically affecting versions 13, 14, 15, and 16. The flaw resides in the rebootWipeUserData method of the RecoverySystem.java component. This method is responsible for performing a factory reset on the device. The vulnerability arises because there is a missing permission check when the device is operating in DSU (Dynamic System Updates) mode, a feature that allows users to load and test new Android system images without affecting the primary system. Due to this missing permission validation, an attacker with limited privileges (low-level permissions) can invoke the factory reset process without requiring user interaction or elevated privileges. The result is a physical denial of service, as the device undergoes a factory reset, erasing all user data and rendering the device temporarily unusable until reconfigured. The CVSS score of 4.3 (medium severity) reflects that the attack vector is physical (local), requires low complexity, and low privileges, but does not impact confidentiality or integrity, only availability. No known exploits have been reported in the wild, and no patches are currently linked, indicating that mitigation may rely on vendor updates or configuration changes. This vulnerability is classified under CWE-862 (Missing Authorization).

Potential Impact

For European organizations, the primary impact of CVE-2025-48614 is the potential loss of device availability due to forced factory resets. This can disrupt business operations, especially in sectors relying heavily on Android devices for critical functions, such as mobile workforce management, point-of-sale systems, or field service devices. The loss of user data and device downtime can lead to operational delays and increased support costs. Since exploitation requires low privileges but no user interaction, insider threats or compromised low-privilege applications could trigger the reset. Organizations using DSU mode for testing or development are particularly at risk. However, the lack of confidentiality or integrity impact limits the risk of data breaches or unauthorized data manipulation. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance. Overall, the threat could affect device availability and operational continuity in European enterprises using affected Android versions.

Mitigation Recommendations

To mitigate CVE-2025-48614, European organizations should implement the following specific measures: 1) Restrict access to DSU mode to trusted personnel only, as this mode is the attack vector. 2) Monitor and audit usage of recovery and factory reset functions to detect unauthorized attempts. 3) Apply vendor patches promptly once available; engage with Google or device manufacturers for updates addressing this vulnerability. 4) Limit installation of applications or services that could invoke rebootWipeUserData or related system calls without proper authorization. 5) Employ mobile device management (MDM) solutions to enforce security policies restricting low-privilege users from triggering factory resets. 6) Educate users and administrators about the risks of DSU mode and factory reset operations. 7) For critical devices, consider disabling DSU mode if not required. These targeted actions go beyond generic advice by focusing on controlling the specific attack surface and monitoring relevant system functions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:12:23.625Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6937058352c2eb5957f2f0e3

Added to database: 12/8/2025, 5:06:11 PM

Last enriched: 12/17/2025, 4:51:15 PM

Last updated: 2/7/2026, 6:49:53 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats