⚠ Actively exploited
Added to CISA KEV on 2025-09-04. Federal agencies required to patch by 2025-09-25. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..
CVE-2025-48543 — Use After Free in Google Android
Severity
8.8HIGHNVD
EPSS
0.3%
top 45.75%
CISA KEV
KEV
Added 2025-09-04
Due 2025-09-25
Exploit
No known exploits
Affected products
Timeline
PublishedSep 4
KEV addedSep 4
KEV dueSep 25
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 2.0 | Impact: 6.0
Affected Packages3 packages
Patches
🔴Vulnerability Details
4GHSA▶
GHSA-98cr-q848-h9x3: In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free↗2025-09-04
CVEList▶
CVE-2025-48543: In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free↗2025-09-04
OSV▶
CVE-2025-48543: In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free↗2025-09-01