
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-48539 is a critical vulnerability discovered in the Android System component, specifically in the SendPacketToPeer function of acl_arbiter.cc. The vulnerability was disclosed on September 4, 2025, affecting Android versions 15.0 and 16.0. It involves a possible out-of-bounds read due to a use-after-free condition (NVD, SecurityWeek).
The vulnerability is classified as a Use After Free (CWE-416) issue where a buffer length is logged after an intermediate call may free the buffer. The CVSS v3.1 base score is 8.0 (HIGH) with the vector string CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating adjacent network attack vector, low attack complexity, low privileges required, and no user interaction needed (NVD).
The vulnerability could lead to remote code execution with no additional execution privileges needed and requires no user interaction for exploitation. The attack can be executed from an adjacent network position, potentially allowing attackers to gain unauthorized access to the system (Help Net Security).
Google has released patches for the vulnerability in the September 2025 Android Security Bulletin. Users are advised to update their devices to the security patch level of 2025-09-01 or later. The fix involves modifying the code to log from the buffer's source before it can be freed, preventing the use-after-free condition (SecurityWeek).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."