Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48644: Denial of service in Google Android

0
Medium
VulnerabilityCVE-2025-48644cvecve-2025-48644
Published: Mon Mar 02 2026 (03/02/2026, 18:42:24 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In multiple locations, there is a possible persistent denial of service due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 16:51:26 UTC

Technical Analysis

CVE-2025-48644 is a vulnerability identified in multiple locations within the Google Android operating system versions 14, 15, 16, and 16-qpr2. The root cause is improper input validation (CWE-20), which allows an attacker with local access and limited privileges to trigger a persistent denial of service (DoS) condition. This vulnerability does not require user interaction, meaning exploitation can occur without any action from the device owner. The attack vector is local (AV:L), requiring the attacker to have some level of local access but only low privileges (PR:L). The vulnerability does not affect confidentiality or integrity but impacts availability (A:H), causing the system or specific services to crash or become unresponsive persistently. The CVSS v3.1 base score is 5.5, reflecting a medium severity level. No known exploits have been reported in the wild, and no patches have been publicly linked at this time. The persistent nature of the DoS suggests that the system may remain inoperable or unstable until rebooted or repaired, potentially disrupting normal device operations. The vulnerability affects a broad range of Android versions, which are widely deployed globally, making the threat relevant to a large user base. The lack of required user interaction and low privilege requirements increase the risk of exploitation in scenarios where local access is possible, such as shared devices or compromised local environments.

Potential Impact

The primary impact of CVE-2025-48644 is on system availability, as it enables a persistent denial of service condition on affected Android devices. This can lead to device crashes, service interruptions, or system instability, affecting end-user productivity and device reliability. Organizations relying on Android devices for critical communication, operations, or data access may experience operational disruptions. Although the vulnerability does not allow privilege escalation or data compromise, the persistent DoS could be leveraged in targeted attacks to disrupt services or cause inconvenience. In environments where multiple users share devices or where local access controls are weak, the risk of exploitation increases. The widespread deployment of affected Android versions means that a large number of devices globally could be impacted, potentially affecting enterprises, government agencies, and individual users. The absence of user interaction requirement facilitates automated or stealthy exploitation by local attackers. However, since exploitation requires local access, remote attackers cannot directly exploit this vulnerability without first compromising the device locally.

Mitigation Recommendations

1. Monitor official Google Android security bulletins and promptly apply patches or security updates once they become available for the affected versions (14, 15, 16, 16-qpr2). 2. Restrict local access to devices by enforcing strong physical security controls and limiting user privileges to reduce the risk of local exploitation. 3. Employ mobile device management (MDM) solutions to enforce security policies, monitor device health, and detect abnormal behavior indicative of DoS conditions. 4. Educate users about the risks of installing untrusted applications or granting unnecessary permissions that could facilitate local attacks. 5. Implement runtime protections such as application sandboxing and exploit mitigation techniques to reduce the impact of improper input validation. 6. In environments with shared devices, enforce session management and user isolation to prevent unauthorized local access. 7. Regularly back up critical data to mitigate operational impact in case devices become unresponsive due to exploitation. 8. Use security monitoring tools to detect repeated crashes or service interruptions that may indicate exploitation attempts. 9. Consider upgrading to newer Android versions beyond 16-qpr2 when available, as they may include fixes or improved security controls.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-05-22T18:12:46.994Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a5db7ed1a09e29cb1cb96a

Added to database: 3/2/2026, 6:48:30 PM

Last enriched: 3/10/2026, 4:51:26 PM

Last updated: 4/15/2026, 7:35:47 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses