Local Privilege Escalation in NFC Payment Settings of Android by Google
CVE-2025-48612
7.8HIGH
What is CVE-2025-48612?
A vulnerability exists in Google's Android operating system that allows an application running on a work profile to potentially alter the default NFC payment settings for the main user. This flaw arises from inadequate input validation across several locations, enabling a local escalation of privilege without requiring any additional execution privileges or user interaction to exploit. Users should be aware of this vulnerability to mitigate risks associated with unauthorized changes to NFC payment configurations.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Android 16
Android 15
Android 14
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved