Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48628: Information disclosure in Google Android

0
High
VulnerabilityCVE-2025-48628cvecve-2025-48628
Published: Mon Dec 08 2025 (12/08/2025, 16:57:44 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In validateIconUserBoundary of PrintManagerService.java, there is a possible cross-user image leak due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:23:40 UTC

Technical Analysis

CVE-2025-48628 is a vulnerability identified in the PrintManagerService component of Google Android, specifically within the validateIconUserBoundary method. This flaw is categorized as a confused deputy problem, where the service improperly validates user boundaries when handling print icon images, resulting in a cross-user image leak. Essentially, a local attacker with limited privileges can exploit this flaw to access image data belonging to other users on the device, thereby breaching confidentiality. Furthermore, this information disclosure can be leveraged to escalate privileges locally without requiring additional execution rights or user interaction, increasing the threat's severity. The vulnerability affects Android versions 13, 14, 15, and 16, which cover a broad range of devices in active use. The CVSS v3.1 base score is 7.8, reflecting high severity due to the combined impact on confidentiality, integrity, and availability, ease of exploitation (local access with low complexity), and no need for user interaction. The flaw is tracked under CWE-441 (Incorrect Authorization). Although no public exploits have been reported yet, the nature of the vulnerability suggests that attackers with local access could leverage it to gain unauthorized access to sensitive data and potentially elevate privileges, compromising device security.

Potential Impact

The vulnerability poses significant risks to organizations and individuals relying on affected Android versions. Confidentiality is compromised as attackers can access images belonging to other users, potentially exposing sensitive or private information. The integrity and availability of the system are also at risk due to the possibility of local privilege escalation, which could allow attackers to execute unauthorized actions or disrupt normal device operations. This could lead to broader compromise of the device, including installation of persistent malware or unauthorized data exfiltration. Enterprises with Bring Your Own Device (BYOD) policies or those deploying Android devices in sensitive environments may face increased risk of insider threats or targeted attacks. The lack of user interaction requirement and low complexity of exploitation make this vulnerability particularly dangerous in environments where multiple users share devices or where local access controls are weak.

Mitigation Recommendations

Organizations should monitor for official patches from Google and apply them promptly once released to address this vulnerability. Until patches are available, enforcing strict access controls to limit local user privileges can reduce exploitation risk. Specifically, restricting unnecessary local user accounts and employing device management policies to control app permissions related to printing services can help. Additionally, auditing and monitoring local access logs for suspicious activity may detect exploitation attempts early. Employing endpoint security solutions capable of detecting anomalous privilege escalation behaviors on Android devices is recommended. For environments with sensitive data, consider disabling or restricting printing services where feasible. Educating users about the risks of local privilege escalation and enforcing strong device lock mechanisms can further mitigate exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:12:31.616Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6937058552c2eb5957f2f126

Added to database: 12/8/2025, 5:06:13 PM

Last enriched: 2/27/2026, 5:23:40 AM

Last updated: 3/25/2026, 5:58:28 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses