⚠ Actively exploited
Added to CISA KEV on 2025-12-02. Federal agencies required to patch by 2025-12-23. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..
CVE-2025-48633 — Reachable Assertion in Frameworks Base
Severity
5.5MEDIUMNVD
EPSS
0.2%
top 63.16%
CISA KEV
KEV
Added 2025-12-02
Due 2025-12-23
Exploit
No known exploits
Affected products
Timeline
KEV addedDec 2
PublishedDec 8
KEV dueDec 23
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
In hasAccountsOnAnyUser of DevicePolicyManagerService.java, there is a possible way to add a Device Owner after provisioning due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6
Affected Packages3 packages
Patches
🔴Vulnerability Details
4📋Vendor Advisories
3Android▶
CVE-2025-48633: Android Security Bulletin 2025-12-01
CVE: CVE-2025-48633
Severity: HIGH
Type: ID
Affected AOSP versions: 13, 14, 15, 16
References: A-417988098↗2025-12-01