CVE-2025-48613

In VBMeta, there is a possible way to modify and resign VBMeta using a test key, assuming the original image was previously signed with the same key. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Configurations

Configuration 1 (hide)

cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

History

06 Mar 2026, 04:15

Type Values Removed Values Added
References
  • {'url': 'https://source.android.com/security/bulletin/2026-03-01', 'tags': ['Broken Link'], 'source': 'security@android.com'}
  • () https://source.android.com/docs/security/bulletin/2026/2026-03-01 -

03 Mar 2026, 18:13

Type Values Removed Values Added
CPE cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
First Time Google android
Google
References () https://source.android.com/security/bulletin/2026-03-01 - () https://source.android.com/security/bulletin/2026-03-01 - Broken Link

03 Mar 2026, 16:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-269

02 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-02 19:16

Updated : 2026-03-06 04:15


NVD link : CVE-2025-48613

Mitre link : CVE-2025-48613

CVE.ORG link : CVE-2025-48613


JSON object : View

Products Affected

google

  • android
CWE
CWE-269

Improper Privilege Management