CVE-2025-48556

In multiple methods of NotificationChannel.java, there is a possible desynchronization from persistence due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:16.0:*:*:*:*:*:*:*

History

05 Sep 2025, 19:02

Type Values Removed Values Added
First Time Google
Google android
References () https://android.googlesource.com/platform/frameworks/base/+/fc5d9b6ef5305263d37404fc3d4afe583a15c62b - () https://android.googlesource.com/platform/frameworks/base/+/fc5d9b6ef5305263d37404fc3d4afe583a15c62b - Patch
References () https://source.android.com/security/bulletin/2025-09-01 - () https://source.android.com/security/bulletin/2025-09-01 - Vendor Advisory
CPE cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:16.0:*:*:*:*:*:*:*

04 Sep 2025, 20:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3
CWE CWE-20

04 Sep 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-04 19:15

Updated : 2025-09-05 19:02


NVD link : CVE-2025-48556

Mitre link : CVE-2025-48556

CVE.ORG link : CVE-2025-48556


JSON object : View

Products Affected

google

  • android
CWE
CWE-20

Improper Input Validation