In multiple locations, there is a possible way to trick a user into accepting a permission due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
References
History
Mon, 08 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android |
|
| CPEs | cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:16.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Google
Google android |
Mon, 08 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1021 | |
| Metrics |
cvssV3_1
|
Mon, 08 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In multiple locations, there is a possible way to trick a user into accepting a permission due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | |
| References |
|
Status: PUBLISHED
Assigner: google_android
Published: 2025-12-08T16:57:23.573Z
Updated: 2025-12-09T04:56:03.632Z
Reserved: 2025-05-22T18:12:07.428Z
Link: CVE-2025-48597
Updated: 2025-12-08T18:46:15.311Z
Status : Analyzed
Published: 2025-12-08T17:16:16.767
Modified: 2025-12-08T19:44:40.860
Link: CVE-2025-48597
No data.