DNA View

⚠️ CISA Known Exploited Vulnerability

Active Threat

This vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog. Active exploitation has been observed in the wild. This poses significant risk to federal enterprises and should be prioritized for immediate patching.

CVE-2025-48633

Medium CISA KEV
Low Medium High Critical
5.5
CVSS Score
Published: Dec 08, 2025
Last Modified: Dec 10, 2025

Vulnerability Description

In hasAccountsOnAnyUser of DevicePolicyManagerService.java, there is a possible way to add a Device Owner after provisioning due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
L
Attack Complexity
L
Privileges Required
L
User Interaction
N
Scope
U
Confidentiality
H
Integrity
N
Availability
N

Known Affected Software

4 configuration(s) from 1 vendor(s)

android
Version:
14.0
CPE:
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
android
Version:
13.0
CPE:
cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*
android
Version:
16.0
CPE:
cpe:2.3:o:google:android:16.0:*:*:*:*:*:*:*
android
Version:
15.0
CPE:
cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
This vulnerability affects 4 software configuration(s). Ensure you patch all affected systems.

Severity Details

5.5
out of 10.0
Medium

CISA KEV Status

Active Exploitation

Listed in CISA's Known Exploited Vulnerabilities catalog

Key Information

Published Date
December 08, 2025