Fixing and finding
Jump to remediation plan
CVE ID

CVE-2025-48572

Published 2025-12-08
Updated 5 months ago
Vendor/s
Android
Product/s
Framework
Version/s
13.0
KEV Status
Active Exploitation
Listed in CISA's Known Exploited Vulnerabilities catalogue. Active exploitation observed in the wild.
CVSS Score (v3.1)
7.8
/ 10
High
Severity Details
Base score
7.8 High
Attack vector
Local
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Description

CVE-2025-48572 is a high-severity (7.8) privilege escalation vulnerability in Android Framework (v13-16) under active exploitation.

CPE

Android logo
Android
Product Version Start Version End (excl.) Status
android 13.0 13.0 vulnerable
android 14.0 14.0 vulnerable
android 15.0 15.0 vulnerable
android 16.0 16.0 vulnerable

Related weakness (CWE)

CWE-306

Remediation plan

1

Apply official patches

Deploy the December 2025 Android Security Bulletin updates (or later) provided by Google or your specific device manufacturer to patch the permission bypass within the Framework component.

2

Update affected systems

Ensure all mobile devices running Android versions 13.0, 14.0, 15.0, and 16.0 are updated to the latest security patch level to mitigate the risk of local privilege escalation.

3

Restrict access

Utilize Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) solutions to enforce strict app installation policies, preventing sideloading and restricting background execution for non-essential applications.

4

Monitor for exploitation

Audit device logs for unauthorized background activity launches and use Mobile Threat Defense (MTD) tools to detect applications attempting to exploit known Framework vulnerabilities or bypass permission prompts.

Detection Guidance

To detect exploitation of CVE-2025-48572, monitor Android Logcat for unusual ActivityManager events where background activities are initiated without user interaction or a foreground task context. Look for patterns of applications attempting to trigger system-level services unexpectedly. Security teams should also scan for installed apps that request excessive background permissions or exhibit behavior consistent with privilege escalation, particularly those not sourced from official or trusted enterprise app stores.

References

Sources

NIST National Vulnerability Database (NVD)
CISA Known Exploited Vulnerabilities (KEV)

Experience superior visibility and a simpler approach to cyber risk management