CVE-2025-48632Improper Input Validation in Frameworks Base

Severity
7.8HIGHNVD
EPSS
0.0%
top 97.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

In setDisplayName of AssociationRequest.java, there is a possible way to cause CDM associations to persist after the user has disassociated them due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

Androidplatform/frameworks_base16-qpr2-next:016-qpr2-next:2025-12-01+3
CVEListV5google/android14, 15, 16+2
NVDgoogle/android14.0, 15.0, 16.0+2

Patches

🔴Vulnerability Details

3
GHSA
GHSA-c72m-x497-8c52: In setDisplayName of AssociationRequest2025-12-08
CVEList
CVE-2025-48632: In setDisplayName of AssociationRequest2025-12-08
OSV
CVE-2025-48632: In setDisplayName of AssociationRequest2025-12-01

📋Vendor Advisories

1
Android
CVE-2025-48632: Android Security Bulletin 2025-12-01 CVE: CVE-2025-48632 Severity: HIGH Type: EoP Affected AOSP versions: 14, 15, 16 References: A-4437428292025-12-01
CVE-2025-48632 — Improper Input Validation | cvebase