Logic Error in Android Device Policy Manager Service Allows Unauthorized Device Owner Addition
CVE-2025-48633

5.5MEDIUM

Key Information:

Vendor

Google

Status
Vendor
CVE Published:
8 December 2025

Badges

📈 Score: 205👾 Exploit Exists🦅 CISA Reported📰 News Worthy

What is CVE-2025-48633?

CVE-2025-48633 is a significant vulnerability identified in the Android Device Policy Manager Service, developed by Google. This flaw arises from a logic error in the hasAccountsOnAnyUser function within the DevicePolicyManagerService.java file. The vulnerability allows for unauthorized addition of a Device Owner after the provisioning process—an action that typically requires escalated privileges. The implication of this vulnerability is serious, as it potentially enables local escalation of privileges without any need for additional permissions or user interaction, placing organizations at risk of unauthorized control over devices. Given that the Device Policy Manager is crucial for managing device policies and security configurations in an enterprise, this vulnerability could lead to considerable disruptions and security lapses.

Potential impact of CVE-2025-48633

  1. Unauthorized Device Control: The primary risk posed by this vulnerability is the ability of malicious actors to gain unauthorized control of devices. This could allow them to manipulate device settings, install unapproved applications, or exfiltrate sensitive data.

  2. Escalation of Privileges: Since the vulnerability permits unauthorized addition of a Device Owner, it effectively allows an attacker to elevate their privileges within the system. This escalation could lead to further security breaches, as compromised administrators can exert control over a wide array of enterprise resources.

  3. Data Breach Risk: Exploitation of this vulnerability could lead to significant data breaches, particularly in environments where sensitive information is managed on Android devices. Confidential employee data, client information, and proprietary corporate data could be exposed, leading to compliance violations and financial repercussions for affected organizations.

CISA has reported CVE-2025-48633

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2025-48633 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

Android 16

Android 15

Android 14

News Articles

CVE-2025-48633 and CVE-2025-48572: Android Framework Information Disclosure and Privilege Escalation Vulnerabilities Exploited in the Wild | SOC Prime

Explore details for CVE-2025-48633 and CVE-2025-48572, high-severity Android Framework vulnerabilities, with a deep analysis on our SOC Prime blog.

4 weeks ago

Google fixes Android vulnerabilities "under targeted exploitation" (CVE-2025-48633, CVE-2025-48572) - Help Net Security

Google patches Android vulnerabilities, including CVE-2025-48633 and CVE-2025-48572, which "may be under limited, targeted exploitation".

1 month ago

CISA Warns of Android 0-Day Vulnerability Exploited in Attacks

CISA added two major Android Framework flaws to its Known Exploited Vulnerabilities list, showing they’re already being used in real attacks.

1 month ago

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • 👾

    Exploit known to exist

  • 🦅

    CISA Reported

  • 📰

    First article discovered by Cyber Press

  • Vulnerability Reserved

.
CVE-2025-48633 : Logic Error in Android Device Policy Manager Service Allows Unauthorized Device Owner Addition