CVE-2025-48556

In multiple methods of NotificationChannel.java, there is a possible desynchronization from persistence due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:16.0:*:*:*:*:*:*:*

History

05 Sep 2025, 19:02

Type Values Removed Values Added
References () https://android.googlesource.com/platform/frameworks/base/+/fc5d9b6ef5305263d37404fc3d4afe583a15c62b - () https://android.googlesource.com/platform/frameworks/base/+/fc5d9b6ef5305263d37404fc3d4afe583a15c62b - Patch
References () https://source.android.com/security/bulletin/2025-09-01 - () https://source.android.com/security/bulletin/2025-09-01 - Vendor Advisory
CPE cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:16.0:*:*:*:*:*:*:*
First Time Google android
Google

04 Sep 2025, 20:15

Type Values Removed Values Added
CWE CWE-20
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3

04 Sep 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-04 19:15

Updated : 2025-09-05 19:02


NVD link : CVE-2025-48556

Mitre link : CVE-2025-48556

CVE.ORG link : CVE-2025-48556


JSON object : View

Products Affected

google

  • android
CWE
CWE-20

Improper Input Validation