Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48623: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-48623cvecve-2025-48623
Published: Mon Dec 08 2025 (12/08/2025, 16:57:40 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In init_pkvm_hyp_vcpu of pkvm.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:22:16 UTC

Technical Analysis

CVE-2025-48623 is a vulnerability identified in the Android kernel, specifically within the pkvm (Protected Kernel Virtual Machine) component's init_pkvm_hyp_vcpu function. The root cause is an out-of-bounds write triggered by improper input validation, classified under CWE-787 (Out-of-bounds Write) and CWE-20 (Improper Input Validation). This flaw allows a local attacker with limited privileges to write outside the intended memory bounds, potentially corrupting kernel memory structures. Such corruption can lead to elevation of privilege, granting the attacker higher-level access without requiring additional execution privileges or user interaction. The vulnerability's CVSS v3.1 score is 7.8, indicating high severity, with impacts rated high on confidentiality, integrity, and availability. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), meaning the vulnerability affects the same security scope. While no public exploits are known at this time, the vulnerability poses a significant risk due to its ease of exploitation and potential impact on device security. The affected product is the Android kernel, which is widely deployed across billions of mobile devices globally. The vulnerability was reserved in May 2025 and published in December 2025, with no patch links currently available, indicating that fixes may still be in development or pending release.

Potential Impact

The impact of CVE-2025-48623 is substantial for organizations and individuals using Android devices. Successful exploitation allows a local attacker to escalate privileges from a limited user context to kernel-level access, potentially enabling full control over the device. This can lead to unauthorized access to sensitive data, installation of persistent malware, disruption of device operations, and bypassing of security controls. For enterprises, this could mean compromise of corporate data on employee devices, lateral movement within mobile device management environments, and exposure of confidential communications. The vulnerability affects confidentiality by enabling data theft, integrity by allowing unauthorized modification of system components, and availability by potentially causing system crashes or denial of service. Given the ubiquity of Android devices in both consumer and enterprise environments, the scope of impact is broad. The lack of required user interaction lowers the barrier for exploitation, increasing risk. Although no known exploits are currently reported, the vulnerability's characteristics make it a likely target for attackers once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2025-48623, organizations should prioritize the following actions: 1) Monitor official Google and Android security advisories for patches addressing this vulnerability and apply them promptly once released. 2) Employ kernel hardening techniques such as enabling kernel address space layout randomization (KASLR), kernel stack protection, and strict memory protection policies to reduce exploitation success. 3) Limit local access to devices by enforcing strong authentication and restricting installation of untrusted applications to minimize the risk of local attackers gaining initial foothold. 4) Utilize mobile device management (MDM) solutions to enforce security policies and monitor for suspicious activity indicative of privilege escalation attempts. 5) Conduct regular security audits and vulnerability assessments on Android devices within the organization to identify and remediate potential weaknesses. 6) Educate users about the risks of installing unverified apps and the importance of keeping devices updated. 7) Consider deploying runtime protection tools that can detect anomalous kernel behavior or memory corruption attempts. These measures collectively reduce the attack surface and improve resilience against exploitation of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:12:31.615Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6937058552c2eb5957f2f114

Added to database: 12/8/2025, 5:06:13 PM

Last enriched: 2/27/2026, 5:22:16 AM

Last updated: 3/25/2026, 3:07:44 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses