
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-48546 is a security vulnerability discovered in the Android operating system's SafeActivityOptions.java component, specifically in the checkPermissions function. The vulnerability was disclosed on September 4, 2025, affecting Android versions 13.0 through 16.0. This vulnerability stems from a logic error in the code that could potentially allow background activity launches (NVD, Android Bulletin).
The vulnerability is classified as a local privilege escalation issue with a CVSS v3.1 base score of 7.8 (HIGH). The vulnerability vector is CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access vector, low attack complexity, low privileges required, and no user interaction needed for exploitation. The vulnerability is categorized under CWE-693 (Protection Mechanism Failure) (NVD).
The vulnerability could lead to local escalation of privilege with no additional execution privileges needed. If successfully exploited, an attacker could potentially execute unauthorized background activities, potentially leading to elevated access rights and compromised system security (NVD).
Google has released security patches as part of the September 2025 security update. Users and organizations are strongly advised to update their Android devices to the latest available security patch level. The fix involves changes to the checkPermissions function in SafeActivityOptions.java, specifically addressing the logic error that allowed unauthorized background activity launches (Android Bulletin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."