CVE-2025-48633: Information disclosure in Google Android
In hasAccountsOnAnyUser of DevicePolicyManagerService.java, there is a possible way to add a Device Owner after provisioning due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
AI Analysis
Technical Summary
CVE-2025-48633 is a vulnerability identified in Google Android versions 13, 14, 15, and 16, specifically within the DevicePolicyManagerService.java component. The flaw exists in the hasAccountsOnAnyUser method, where a logic error permits an attacker with limited privileges to add a Device Owner after the device provisioning process has completed. Normally, Device Owner status is assigned during provisioning to enable device management capabilities. This vulnerability allows bypassing that restriction, enabling local escalation of privilege without requiring additional execution privileges or user interaction. The attacker can leverage this to gain elevated access to device management functions, potentially leading to information disclosure related to device accounts and policies. The vulnerability is local, meaning the attacker must have some level of access to the device, but no user interaction is needed, increasing the risk of stealthy exploitation. The CVSS v3.1 base score is 5.5, indicating a medium severity level, with attack vector as local, low attack complexity, low privileges required, no user interaction, unchanged scope, and high impact on confidentiality but no impact on integrity or availability. No public exploits have been reported yet, and no patches are linked in the provided data, suggesting that remediation may be pending or in development. This vulnerability is significant in environments where Android devices are managed via device owner policies, such as enterprise mobile device management (MDM) solutions.
Potential Impact
The primary impact of CVE-2025-48633 is local privilege escalation on affected Android devices, allowing an attacker with limited privileges to gain Device Owner status post-provisioning. This elevated privilege can expose sensitive device management information and potentially allow unauthorized changes to device policies. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach can lead to further attacks or unauthorized access to corporate or personal data managed by device policies. Organizations relying on Android devices for enterprise mobility management or government use may face increased risk of insider threats or malware leveraging this flaw to bypass security controls. Since no user interaction is required, exploitation can occur silently once local access is obtained, increasing the risk in shared or physically accessible devices. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability's nature suggests it could be leveraged in targeted attacks against high-value Android deployments.
Mitigation Recommendations
To mitigate CVE-2025-48633, organizations should implement the following specific measures: 1) Restrict physical and local access to Android devices, ensuring only trusted users can interact with them. 2) Monitor and audit device owner assignments and provisioning logs to detect unauthorized changes. 3) Apply security policies that limit the ability to add or modify device owners post-provisioning, if configurable via MDM solutions. 4) Deploy endpoint detection and response (EDR) tools capable of identifying anomalous privilege escalations on Android devices. 5) Stay informed about official Google security advisories and apply patches promptly once available. 6) Consider using device encryption and strong authentication mechanisms to reduce the risk of local exploitation. 7) Educate users and administrators on the risks of local privilege escalation and enforce strict device usage policies. These steps go beyond generic advice by focusing on controlling local access, monitoring device owner changes, and preparing for patch deployment.
Affected Countries
United States, India, Brazil, Indonesia, Russia, Germany, United Kingdom, France, Japan, South Korea, Mexico, Canada, Australia, Italy, Spain
CVE-2025-48633: Information disclosure in Google Android
Description
In hasAccountsOnAnyUser of DevicePolicyManagerService.java, there is a possible way to add a Device Owner after provisioning due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-48633 is a vulnerability identified in Google Android versions 13, 14, 15, and 16, specifically within the DevicePolicyManagerService.java component. The flaw exists in the hasAccountsOnAnyUser method, where a logic error permits an attacker with limited privileges to add a Device Owner after the device provisioning process has completed. Normally, Device Owner status is assigned during provisioning to enable device management capabilities. This vulnerability allows bypassing that restriction, enabling local escalation of privilege without requiring additional execution privileges or user interaction. The attacker can leverage this to gain elevated access to device management functions, potentially leading to information disclosure related to device accounts and policies. The vulnerability is local, meaning the attacker must have some level of access to the device, but no user interaction is needed, increasing the risk of stealthy exploitation. The CVSS v3.1 base score is 5.5, indicating a medium severity level, with attack vector as local, low attack complexity, low privileges required, no user interaction, unchanged scope, and high impact on confidentiality but no impact on integrity or availability. No public exploits have been reported yet, and no patches are linked in the provided data, suggesting that remediation may be pending or in development. This vulnerability is significant in environments where Android devices are managed via device owner policies, such as enterprise mobile device management (MDM) solutions.
Potential Impact
The primary impact of CVE-2025-48633 is local privilege escalation on affected Android devices, allowing an attacker with limited privileges to gain Device Owner status post-provisioning. This elevated privilege can expose sensitive device management information and potentially allow unauthorized changes to device policies. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach can lead to further attacks or unauthorized access to corporate or personal data managed by device policies. Organizations relying on Android devices for enterprise mobility management or government use may face increased risk of insider threats or malware leveraging this flaw to bypass security controls. Since no user interaction is required, exploitation can occur silently once local access is obtained, increasing the risk in shared or physically accessible devices. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability's nature suggests it could be leveraged in targeted attacks against high-value Android deployments.
Mitigation Recommendations
To mitigate CVE-2025-48633, organizations should implement the following specific measures: 1) Restrict physical and local access to Android devices, ensuring only trusted users can interact with them. 2) Monitor and audit device owner assignments and provisioning logs to detect unauthorized changes. 3) Apply security policies that limit the ability to add or modify device owners post-provisioning, if configurable via MDM solutions. 4) Deploy endpoint detection and response (EDR) tools capable of identifying anomalous privilege escalations on Android devices. 5) Stay informed about official Google security advisories and apply patches promptly once available. 6) Consider using device encryption and strong authentication mechanisms to reduce the risk of local exploitation. 7) Educate users and administrators on the risks of local privilege escalation and enforce strict device usage policies. These steps go beyond generic advice by focusing on controlling local access, monitoring device owner changes, and preparing for patch deployment.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- google_android
- Date Reserved
- 2025-05-22T18:12:39.228Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6937058652c2eb5957f2f179
Added to database: 12/8/2025, 5:06:14 PM
Last enriched: 2/27/2026, 5:24:26 AM
Last updated: 3/23/2026, 9:11:07 PM
Views: 153
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.