Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48629: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2025-48629cvecve-2025-48629
Published: Mon Dec 08 2025 (12/08/2025, 16:57:46 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In findAvailRecognizer of VoiceInteractionManagerService.java, there is a possible way to become the default speech recognizer app due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:23:56 UTC

Technical Analysis

CVE-2025-48629 is an elevation of privilege vulnerability found in Google Android versions 13, 14, 15, and 16. The flaw exists in the findAvailRecognizer method within the VoiceInteractionManagerService.java component. Due to an insecure default value, an attacker with local access but limited privileges can manipulate the system to become the default speech recognizer app. This manipulation does not require additional execution privileges or user interaction, making exploitation relatively straightforward once local access is obtained. By becoming the default speech recognizer, the attacker can leverage the elevated privileges granted to this service to execute unauthorized actions, potentially compromising system confidentiality, integrity, and availability. The vulnerability is classified under CWE-1188, which relates to insecure default values leading to privilege escalation. Although no public exploits have been reported, the vulnerability's characteristics and CVSS score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) indicate a significant risk. The flaw affects multiple recent Android versions, highlighting the need for prompt mitigation. No official patches have been published at the time of this report, so organizations must rely on interim protective measures.

Potential Impact

The impact of CVE-2025-48629 is substantial for organizations and users relying on affected Android versions. Successful exploitation allows an attacker with limited local privileges to escalate their access to higher privilege levels without user interaction, potentially leading to full device compromise. This can result in unauthorized access to sensitive data, manipulation or disruption of system services, and installation of persistent malicious software. The compromise of the default speech recognizer app could also enable interception or manipulation of voice commands and data, further endangering user privacy and security. For enterprises, this vulnerability could facilitate lateral movement within corporate networks via compromised mobile devices, increasing the risk of broader breaches. The lack of required user interaction and the ease of exploitation amplify the threat, making timely mitigation critical to prevent exploitation in environments where local access might be possible, such as shared devices, lost or stolen phones, or devices exposed to malicious apps.

Mitigation Recommendations

To mitigate CVE-2025-48629, organizations should: 1) Monitor for official security updates from Google and apply patches promptly once available. 2) Restrict local access to devices by enforcing strong device lock policies, including biometric or complex PINs, to reduce the risk of unauthorized local exploitation. 3) Limit installation of untrusted or third-party applications that could attempt to exploit this vulnerability by enforcing strict app vetting and using mobile device management (MDM) solutions. 4) Employ runtime application self-protection (RASP) and endpoint detection and response (EDR) tools capable of detecting anomalous behavior related to voice interaction services. 5) Educate users about the risks of leaving devices unattended or lending them to untrusted individuals. 6) For high-security environments, consider disabling or restricting voice interaction features if feasible until patches are applied. 7) Conduct regular security audits and penetration testing focused on privilege escalation vectors within mobile environments. These measures, combined with timely patching, will reduce the attack surface and limit the potential for exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:12:31.616Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6937058552c2eb5957f2f12a

Added to database: 12/8/2025, 5:06:13 PM

Last enriched: 2/27/2026, 5:23:56 AM

Last updated: 3/25/2026, 4:39:17 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses