In initDecoder of C2SoftDav1dDec
Description
In initDecoder of C2SoftDav1dDec
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Search and filter 8341 vulnerabilities with AI analyst insights
In initDecoder of C2SoftDav1dDec
In initDecoder of C2SoftDav1dDec
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In multiple functions of HeaderPrivacyIconsController
In multiple functions of HeaderPrivacyIconsController
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In startAlwaysOnVpn of Vpn
In startAlwaysOnVpn of Vpn
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In onActivityResult of EditFdnContactScreen
In onActivityResult of EditFdnContactScreen
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In multiple functions of BaseBundle
In multiple functions of BaseBundle
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In VerifyNoOverlapInSessions of apexd.cpp, there is a possible way to block security updates through mainline installations due to a logic error in th...
In VerifyNoOverlapInSessions of apexd.cpp, there is a possible way to block security updates through mainline installations due to a logic error in the code. This could lead to local escalation of pri...
Executive Summary:
A critical vulnerability has been discovered in multiple products, stemming from a logic error that allows an attacker to block essential security updates. This flaw can be exploited by a local user to prevent patches from being applied, leaving the system exposed to other vulnerabilities and ultimately enabling the attacker to gain elevated administrative privileges, leading to a full system compromise.
Vulnerability Details
CVE-ID: CVE-2025-48581
Affected Software: In VerifyNoOverlapInSessions of Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: A critical logic error exists within the VerifyNoOverlapInSessions function of the apexd.cpp component. This function is responsible for managing and validating update installation sessions. An attacker with local access can craft a malicious update session request that the flawed logic fails to properly reject, causing it to enter a persistent state that blocks all subsequent legitimate security update installations. By preventing the system from being patched, the attacker can then leverage any other known, unpatched vulnerability to escalate their privileges to the highest level.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation would have a severe business impact by effectively disabling the security update mechanism, creating a persistent window of exposure. This allows an attacker to achieve a local privilege escalation, granting them full control over the affected system. The potential consequences include unauthorized access to sensitive data, deployment of ransomware, complete system disruption, and using the compromised asset as a staging point for further attacks into the network. This could lead to significant financial loss, reputational damage, and regulatory penalties.
Remediation Plan
Immediate Action:
Proactive Monitoring:
apexd service or mainline update installations.Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date of September 4, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, given the critical CVSS score and the high-impact nature of the flaw (disabling security updates), it is highly probable that threat actors will prioritize developing an exploit. The vulnerability is an ideal precursor for more complex attack chains.
Analyst Recommendation
Due to the critical severity (CVSS 9.8) of this vulnerability, immediate action is required. Organizations must prioritize the identification and patching of all affected assets on an emergency basis. Although this CVE is not currently listed on the CISA KEV catalog, its potential to block security updates makes it a prime candidate for future inclusion and a high-value target for attackers. If patching is delayed for any reason, the compensating controls listed above must be implemented immediately to reduce the risk of exploitation.
Update In VerifyNoOverlapInSessions of Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
In connectInternal of MediaBrowser
In connectInternal of MediaBrowser
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In multiple functions of CertInstaller
In multiple functions of CertInstaller
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In sendCommand of MediaSessionRecord
In sendCommand of MediaSessionRecord
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Android Framework Privilege Escalation Vulnerability - Active in CISA KEV catalog.
Android Framework Privilege Escalation Vulnerability - Active in CISA KEV catalog.
Executive Summary:
A high-severity vulnerability has been identified across multiple products that allows an attacker to bypass security permissions. This flaw enables a malicious application to launch new windows or activities from the background, which could be used to overlay legitimate applications with fake login screens to steal credentials or trick users into granting additional, dangerous permissions. Due to confirmed active exploitation, immediate patching is critical to prevent potential system compromise and data theft.
Vulnerability Details
CVE-ID: CVE-2025-48572
Affected Software: multiple Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability stems from an improper permission check within the component responsible for managing application activities. An attacker can craft a specially designed request that circumvents the system's security controls, which are meant to prevent background applications from launching user interface components into the foreground. A low-privileged, malicious application can exploit this flaw to force its own activity or screen to appear on top of other applications, without user consent or interaction. This allows the attacker to control what the user sees, enabling UI redressing, phishing, or tapjacking attacks.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.8. Exploitation could have significant consequences for the organization, primarily through social engineering attacks that appear highly convincing. An attacker could overlay a fake credential-entry screen on a legitimate banking or corporate application, leading to the theft of sensitive user credentials. This could result in unauthorized access to corporate data, financial systems, and other critical resources. The risk is heightened by the vulnerability's presence in multiple products, potentially affecting a wide range of endpoints from mobile devices to workstations.
Remediation Plan
Immediate Action: System administrators must prioritize the deployment of security updates released by the affected vendors to all vulnerable assets. Due to active exploitation, these patches should be applied on an emergency basis. After patching, monitor systems for any signs of compromise that may have occurred prior to remediation and review access logs for anomalous activity.
Proactive Monitoring: Security teams should monitor for indicators of compromise, including unexpected application pop-ups or windows launching without user interaction. In endpoint and system logs, look for unusual patterns of activity launches, particularly from applications running in the background. EDR and MDM solutions can be configured to alert on applications attempting to draw over other apps or requesting sensitive permissions unexpectedly.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of December 8, 2025, this vulnerability is being actively exploited in the wild, as confirmed by its inclusion in the CISA Known Exploited Vulnerabilities (KEV) catalog. The short remediation deadline of December 22, 2025, for federal agencies indicates a high level of threat actor activity and a significant risk to unpatched systems.
Analyst Recommendation
Given the High severity rating (CVSS 7.8), the inclusion in the CISA KEV catalog, and confirmed active exploitation, this vulnerability poses a critical and immediate threat to the organization. We strongly recommend that all available vendor patches be applied on an emergency basis across all affected systems, without delay. The CISA KEV deadline of December 22, 2025, should be treated as the absolute final date for remediation. Failure to act swiftly will leave the organization exposed to credential theft, data breaches, and further network intrusion.
FEDERAL DEADLINE: December 22, 2025 (20 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. FEDERAL DEADLINE: December 22, 2025 (20 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Deadline: December 22, 2025
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
In multiple locations, there is a possible bypass of user profile boundary with a forwarded intent due to improper input validation
In multiple locations, there is a possible bypass of user profile boundary with a forwarded intent due to improper input validation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In multiple locations, there is a possible way to bypass the cross profile intent filter due to a logic error in the code
In multiple locations, there is a possible way to bypass the cross profile intent filter due to a logic error in the code
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In multiple locations, there is a possible intent filter bypass due to a race condition
In multiple locations, there is a possible intent filter bypass due to a race condition
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In onNullBinding of RemoteFillService
In onNullBinding of RemoteFillService
Executive Summary:
A high-severity vulnerability in the RemoteFillService component, likely within the Android OS, could lead to a denial of service or potential privilege escalation on affected devices.
Vulnerability Details
CVE-ID: CVE-2025-48563
Affected Software: Android OS (inferred)
Affected Versions: See vendor advisory for affected versions
Vulnerability: A flaw exists in the onNullBinding function of the RemoteFillService. Vulnerabilities in service binding functions can often be triggered by malicious applications, leading to conditions like Null Pointer Dereferences that cause the service or the entire system to crash (Denial of Service).
Business Impact
This vulnerability is rated High with a CVSS score of 7.8. An attacker could exploit this by creating a malicious application that, when installed by a user, interacts with the vulnerable service to trigger a system-wide crash, rendering the device unusable until it is rebooted. This could lead to data loss for unsaved work and significant user disruption. Depending on the exact nature of the flaw, it could also be a pathway to privilege escalation.
Remediation Plan
Immediate Action: Apply the latest Android security patches provided by the device manufacturer as soon as they are released. Ensure devices are configured for automatic updates where possible.
Proactive Monitoring: Use Mobile Threat Defense (MTD) solutions to scan for and block malicious applications. Monitor device fleets for abnormal crash rates or stability issues that could indicate exploitation.
Compensating Controls: Educate users on safe mobile practices, including only installing applications from official app stores and being wary of apps that request excessive permissions.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 4, 2025, there is no evidence of active exploitation. Flaws in core Android services are serious because they can be triggered by any malicious app that a user is tricked into installing.
Analyst Recommendation
The risk of a system-level denial of service warrants prompt patching of all affected Android devices. Mobile device administrators should prioritize the rollout of the relevant security updates to their fleets to ensure device stability and protect against potential follow-on attacks that could leverage this vulnerability.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In multiple functions of BatteryService
In multiple functions of BatteryService
Executive Summary:
A high-severity vulnerability exists in the BatteryService component of multiple products, which could be exploited by an attacker to cause a denial of service or potentially escalate privileges.
Vulnerability Details
CVE-ID: CVE-2025-48558
Affected Software: multiple Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: An unspecified vulnerability is present in multiple functions within the BatteryService component. Flaws in a system-level service like this often relate to improper input validation or state management, which could be triggered by a malicious application to cause instability or gain access to higher-privileged operations.
Business Impact
This vulnerability is rated high with a CVSS score of 7.8. A successful exploit could lead to a denial of service by crashing a core system process, making the device unstable or unusable. Depending on the nature of the flaw, it could also provide a pathway for a low-privileged application to escalate its privileges, leading to a full system compromise and unauthorized access to data.
Remediation Plan
Immediate Action: Apply the security patches provided by the vendor to address the vulnerabilities in the BatteryService.
Proactive Monitoring: Monitor system logs for errors, warnings, or unexpected crashes related to the BatteryService. Utilize endpoint security tools to detect anomalous behavior from applications interacting with system services.
Compensating Controls: Enforce the principle of least privilege for all applications and users. Use application sandboxing and control features to limit the ability of applications to interact with sensitive system services.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 4, 2025, there is no public information indicating active exploitation of this vulnerability. However, vulnerabilities in privileged system services are valuable targets for attackers seeking to compromise a device.
Analyst Recommendation
The risk of privilege escalation and denial of service from a core system component necessitates immediate action. Administrators must prioritize the deployment of the vendor's patch to all affected systems to prevent potential exploitation and maintain system integrity.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In multiple methods of NotificationChannel
In multiple methods of NotificationChannel
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In multiple functions of NotificationStation
In multiple functions of NotificationStation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In handlePackagesChanged of DevicePolicyManagerService
In handlePackagesChanged of DevicePolicyManagerService
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In saveGlobalProxyLocked of DevicePolicyManagerService
In saveGlobalProxyLocked of DevicePolicyManagerService
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Support Board plugin for WordPress is vulnerable to unauthorized access/modification/deletion of data due to use of hardcoded default secrets in t...
The Support Board plugin for WordPress is vulnerable to unauthorized access/modification/deletion of data due to use of hardcoded default secrets in the sb_encryption() function in all versions up to,...
Update The Support Board plugin for WordPress is vulnerable to unauthorized Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
In multiple locations, there is a possible way to record audio via a background app due to a missing permission check
In multiple locations, there is a possible way to record audio via a background app due to a missing permission check
Executive Summary:
A high-severity permission check vulnerability across multiple products allows a background application to record audio without user consent, leading to a significant breach of privacy.
Vulnerability Details
CVE-ID: CVE-2025-48549
Affected Software: multiple Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The affected software contains a missing permission check in multiple locations. This flaw allows a malicious application running in the background, which has not been granted microphone access, to bypass security controls and record audio surreptitiously.
Business Impact
Rated as high severity with a CVSS score of 7.8, this vulnerability poses a direct threat to data privacy and confidentiality. Successful exploitation allows an attacker to eavesdrop on sensitive conversations, potentially capturing personal data, trade secrets, or confidential business information. This can lead to severe reputational damage, regulatory fines, and a loss of customer trust.
Remediation Plan
Immediate Action: Apply the vendor-provided security updates immediately to enforce the necessary permission checks.
Proactive Monitoring: Utilize endpoint security solutions to monitor for applications attempting to access the microphone without proper permissions. Regularly audit application permissions on managed devices.
Compensating Controls: Implement application whitelisting or Mobile Device Management (MDM) policies to restrict the installation of unauthorized or untrusted applications on corporate devices.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 4, 2025, there is no public information indicating active exploitation of this vulnerability. However, such privacy-invasive vulnerabilities are highly sought after for spyware and targeted attacks.
Analyst Recommendation
This is a critical privacy vulnerability that requires immediate remediation. All affected systems must be patched to prevent unauthorized audio recording. Organizations should also take this opportunity to review and reinforce their policies regarding application installation and permissions on all endpoints.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In multiple functions of AppOpsControllerImpl
In multiple functions of AppOpsControllerImpl
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In checkPermissions of SafeActivityOptions
In checkPermissions of SafeActivityOptions
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In multiple locations, there is a possible way to read files belonging to other apps due to SQL injection
In multiple locations, there is a possible way to read files belonging to other apps due to SQL injection
Apply vendor patches immediately. Review database access controls and enable query logging.
In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free
In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free
Executive Summary:
A critical use-after-free vulnerability has been discovered in multiple products, primarily affecting the Android operating system. This flaw allows an attacker to escape the Chrome browser's security sandbox and attack core system services, potentially leading to a full compromise of the affected device, data theft, and installation of malicious software. Due to confirmed active exploitation, immediate remediation is required.
Vulnerability Details
CVE-ID: CVE-2025-48543
Affected Software: multiple Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is a use-after-free condition within the software components responsible for rendering web content. An attacker can exploit this by luring a user to a specially crafted malicious website. When the page is processed, the flaw allows the attacker to corrupt memory, leading to arbitrary code execution within the highly-restricted Chrome sandbox. The vulnerability further enables the attacker's code to break out of this sandbox and interact with the underlying Android operating system, specifically targeting the high-privilege system_server process to achieve full system compromise.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation could have a severe impact on the organization, leading to a complete compromise of corporate or employee-owned mobile devices. Potential consequences include the exfiltration of sensitive corporate data, theft of user credentials, installation of persistent spyware or ransomware, and the use of compromised devices as a pivot point to attack the internal corporate network. A breach stemming from this vulnerability could result in significant financial loss, operational disruption, and reputational damage.
Remediation Plan
Immediate Action: Apply all relevant security updates for the Android operating system and Chrome browser provided by the device manufacturer or Google. Due to the severity and active exploitation of this vulnerability, these patches should be deployed on an emergency basis across all managed mobile devices.
Proactive Monitoring: Security teams should actively monitor for signs of compromise. This includes reviewing Android system logs (logcat) for anomalous crashes related to the system_server or browser processes, analyzing network traffic for unusual outbound connections from mobile devices to unknown C2 servers, and using Mobile Threat Defense (MTD) solutions to detect suspicious application behavior or privilege escalation events.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of September 4, 2025, this vulnerability has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog. This confirms that threat actors are actively and successfully exploiting this flaw in real-world attacks. Federal agencies are mandated to remediate this vulnerability by September 24, 2025, and it is strongly recommended that private sector organizations adhere to a similar timeline.
Analyst Recommendation
Given the high severity score (CVSS 8.8) and its inclusion in the CISA KEV catalog, this vulnerability represents a clear and present danger to the organization. We recommend that CVE-2025-48543 be treated as a critical priority. The primary course of action must be the immediate deployment of vendor-supplied security patches to all affected Android devices. All other remediation efforts, such as monitoring and compensating controls, should be considered secondary to patching. Failure to act swiftly may result in the compromise of sensitive data and corporate assets.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Deadline: September 24, 2025
In onCreate of FaceSettings
In onCreate of FaceSettings
Executive Summary:
A high-severity vulnerability in the FaceSettings component of multiple products could allow an attacker to bypass security mechanisms or cause a denial of service.
Vulnerability Details
CVE-ID: CVE-2025-48541
Affected Software: onCreate Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: A flaw exists within the onCreate function of the FaceSettings component. This suggests an improper initialization or configuration handling issue that could be exploited when the face settings feature is accessed. An attacker with local access or a malicious application could potentially trigger this flaw to gain elevated privileges or disrupt system functionality.
Business Impact
This vulnerability carries a high-severity CVSS score of 7.8. Exploitation could lead to the bypass of biometric authentication controls, allowing unauthorized access to a device or sensitive information. Alternatively, the flaw could be used to trigger a denial of service condition, crashing a critical system process and rendering the device unusable until rebooted.
Remediation Plan
Immediate Action: Deploy the security updates released by the vendor to remediate this vulnerability across all affected devices.
Proactive Monitoring: Monitor audit logs for unusual or repeated failed access attempts related to biometric authentication. Review system logs for crashes or errors associated with the FaceSettings component.
Compensating Controls: Enforce multi-factor authentication policies that require a secondary factor (e.g., PIN, password) in addition to biometrics to mitigate the risk of a bypass.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 4, 2025, there is no public information indicating active exploitation of this vulnerability. Flaws in security-sensitive components like authentication mechanisms are often targeted for exploit development.
Analyst Recommendation
The potential for security control bypass requires immediate attention. It is strongly recommended to apply the vendor-provided patch to all affected systems without delay. Reinforcing security with multi-factor authentication provides an essential additional layer of defense against this type of threat.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In processTransactInternal of RpcState
In processTransactInternal of RpcState
Executive Summary:
A high-severity vulnerability in the Remote Procedure Call (RPC) handling mechanism of multiple products could allow an attacker to cause a denial of service or execute arbitrary code.
Vulnerability Details
CVE-ID: CVE-2025-48540
Affected Software: In processTransactInternal of Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: An unspecified flaw exists in the processTransactInternal function of the RpcState component. This function is critical for processing RPC transactions, and a vulnerability here could allow an attacker to corrupt system state or trigger unintended behavior by sending a malformed RPC request. Authentication requirements are unknown but may not be required for some RPC endpoints.
Business Impact
With a CVSS score of 7.8, this vulnerability poses a significant threat. A successful exploit could result in a denial of service, rendering the affected service or system unavailable. If the flaw allows for code execution, an attacker could gain control over the system, leading to severe consequences such as data exfiltration, lateral movement within the network, and complete system compromise.
Remediation Plan
Immediate Action: Apply the vendor-provided security patches immediately to correct the flaw in the RPC handling code.
Proactive Monitoring: Monitor network traffic for malformed or anomalous RPC requests targeting the affected systems. Check application and system logs for errors or crashes related to the RpcState component.
Compensating Controls: If patching is not immediately possible, restrict network access to the vulnerable RPC service to only trusted hosts using firewalls or access control lists.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 4, 2025, there is no public information indicating active exploitation of this vulnerability. However, vulnerabilities in core communication components like RPC are prime targets for exploit development.
Analyst Recommendation
The potential for remote exploitation elevates the urgency of this vulnerability. Organizations must prioritize the immediate application of vendor patches. Where patching is delayed, compensating controls such as network segmentation should be implemented as a temporary measure to reduce the attack surface.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In SendPacketToPeer of acl_arbiter
In SendPacketToPeer of acl_arbiter
Executive Summary:
A high-severity vulnerability in the acl_arbiter component could allow an attacker to cause a denial of service or execute arbitrary code via malformed network packets.
Vulnerability Details
CVE-ID: CVE-2025-48539
Affected Software: SendPacketToPeer Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: An unspecified flaw exists in the SendPacketToPeer function within the acl_arbiter component. This suggests a vulnerability in packet processing, such as a buffer overflow or improper input validation, which could be triggered by a specially crafted network packet sent from a peer.
Business Impact
A successful exploit could lead to a crash of the affected service, resulting in a denial-of-service condition that disrupts operations. Depending on the nature of the flaw, it could also allow for remote code execution, giving an attacker control over the affected system. The CVSS score of 8.0 (High) indicates a significant risk to system availability and integrity.
Remediation Plan
Immediate Action: Apply the security updates provided by the vendor to patch the vulnerable acl_arbiter component.
Proactive Monitoring: Monitor network traffic for malformed or anomalous packets targeting the affected service. Check system logs for application crashes or errors related to packet processing.
Compensating Controls: If possible, configure firewalls or intrusion prevention systems (IPS) to block traffic from untrusted peers. Enforce strict access control lists (ACLs) to limit which systems can communicate with the vulnerable service.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 4, 2025, there is no public information indicating active exploitation of this vulnerability. Vulnerabilities in low-level networking functions are often potent and can be difficult to detect.
Analyst Recommendation
The potential for remote code execution or denial of service makes this a high-priority vulnerability. It is crucial for administrators to apply the vendor's patch immediately to prevent attackers from compromising or disrupting the availability of the affected service.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In grantAllowlistedPackagePermissions of SettingsSliceProvider
In grantAllowlistedPackagePermissions of SettingsSliceProvider
Executive Summary:
A high-severity vulnerability, identified as CVE-2025-48536, has been discovered in a core component of multiple products, likely affecting various Android-based devices. This flaw could allow a malicious application to grant itself elevated permissions without user consent, potentially leading to unauthorized access to sensitive data, installation of spyware, or a full compromise of the affected device. Organizations are urged to apply vendor security patches immediately to mitigate the significant risk of data breaches and system compromise.
Vulnerability Details
CVE-ID: CVE-2025-48536
Affected Software: In grantAllowlistedPackagePermissions of Multiple Products
Affected Versions: See vendor advisory for specific affected versions. This vulnerability likely impacts multiple versions of the Android OS prior to the December 2025 security updates.
Vulnerability: This vulnerability is a privilege escalation flaw within the SettingsSliceProvider component, specifically in the grantAllowlistedPackagePermissions function. A locally installed, low-privilege malicious application could send a specially crafted request to this function. Due to improper validation, the function may incorrectly grant the malicious application sensitive permissions that are normally restricted. An attacker would typically need to convince a user to install a malicious application from an untrusted source to trigger this exploit, which would then proceed to escalate its own privileges silently in the background.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.8. Successful exploitation could have a significant negative impact on the organization. If corporate mobile devices are compromised, an attacker could gain access to sensitive business data, including emails, internal documents, and credentials for corporate networks. This could lead to a major data breach, financial loss, reputational damage, and potential regulatory fines for non-compliance with data protection standards. The ability for an attacker to escalate privileges makes it possible to install persistent malware, monitor communications, and use the device as a pivot point to attack the wider corporate network.
Remediation Plan
Immediate Action: Apply the vendor-provided security updates (e.g., the December 2025 Android Security Bulletin) immediately across all managed mobile devices. Prioritize patching for devices used by executives and employees with access to critical systems or sensitive data. After patching, review application permission logs via Mobile Device Management (MDM) solutions for any unusual or unauthorized permission grants that may have occurred prior to the update.
Proactive Monitoring: Utilize an MDM or Mobile Threat Defense (MTD) solution to monitor for signs of compromise. Specifically, look for applications with an unusual combination of permissions, unexpected installations of new applications, and anomalous network traffic originating from mobile devices that could indicate data exfiltration. Configure alerts for any application attempting to gain high-level permissions post-installation.
Compensating Controls: If patching cannot be immediately deployed, enforce application whitelisting through your MDM policy to prevent the installation of applications from untrusted sources. Restrict access to sensitive corporate data from unpatched devices. Enhance user awareness training to educate employees on the risks of sideloading applications and granting unnecessary permissions.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 8, 2025, there are no known public exploits or observed in-the-wild attacks targeting CVE-2025-48536. However, given the high severity and the nature of privilege escalation vulnerabilities, it is highly probable that security researchers and threat actors will reverse-engineer the patch to develop a functional exploit. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Given the high CVSS score of 7.8, CVE-2025-48536 represents a significant security risk to the organization. This type of privilege escalation vulnerability is a prime target for threat actors aiming to compromise mobile endpoints for data theft or espionage. Although there is no evidence of active exploitation at this time, we recommend treating this as a high-priority issue. Organizations must act swiftly to identify all vulnerable devices and deploy the necessary security patches on an expedited schedule to prevent potential exploitation.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In assertSafeToStartCustomActivity of AppRestrictionsFragment
In assertSafeToStartCustomActivity of AppRestrictionsFragment
Executive Summary:
A high-severity vulnerability in the AppRestrictionsFragment component of multiple products could allow a malicious application to bypass security restrictions and perform unauthorized actions.
Vulnerability Details
CVE-ID: CVE-2025-48535
Affected Software: In assertSafeToStartCustomActivity of Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: A flaw exists in the assertSafeToStartCustomActivity function within the AppRestrictionsFragment. This suggests a logic error or improper validation that allows a lower-privileged or malicious application to initiate a custom activity that it should not have access to, effectively bypassing intended security controls.
Business Impact
This vulnerability is rated high with a CVSS score of 7.8. Successful exploitation could lead to privilege escalation on the affected device or system. This could enable a malicious application to access sensitive user data, modify system settings, or execute commands outside of its intended permissions, leading to a full compromise of the device's integrity and user privacy.
Remediation Plan
Immediate Action: Immediately apply security updates provided by the vendor to patch the vulnerable component.
Proactive Monitoring: Monitor for unexpected application activities or security policy violations on managed endpoints. Utilize Mobile Device Management (MDM) or Endpoint Detection and Response (EDR) solutions to detect suspicious behavior.
Compensating Controls: Enforce application whitelisting policies to prevent the installation of untrusted applications. Ensure that devices are configured with the principle of least privilege to limit the potential impact of an exploit.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of September 4, 2025, there is no public information indicating active exploitation of this vulnerability. However, vulnerabilities that bypass security controls are attractive targets for malware developers.
Analyst Recommendation
The risk of privilege escalation makes this a critical vulnerability to address. Administrators should prioritize the deployment of the vendor patch across all affected endpoints without delay. Delaying the update leaves systems exposed to potential data breaches and unauthorized system modifications.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In getDefaultCBRPackageName of CellBroadcastHandler
In getDefaultCBRPackageName of CellBroadcastHandler
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In markMediaAsFavorite of MediaProvider
In markMediaAsFavorite of MediaProvider
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In getCallingPackageName of CredentialStorage, there is a possible permission bypass due to a logic error in the code
In getCallingPackageName of CredentialStorage, there is a possible permission bypass due to a logic error in the code
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In multiple locations, there is a possible condition that results in OOB accesses due to an incorrect bounds check
In multiple locations, there is a possible condition that results in OOB accesses due to an incorrect bounds check
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In disassociate of DisassociationProcessor
In disassociate of DisassociationProcessor
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In onCreate of SelectAccountActivity
In onCreate of SelectAccountActivity
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In setDisplayName of AssociationRequest
In setDisplayName of AssociationRequest
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper return value within AMD uProf can allow a local attacker to bypass KSLR, potentially resulting in loss of confidentiality or availability
Improper return value within AMD uProf can allow a local attacker to bypass KSLR, potentially resulting in loss of confidentiality or availability
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A null pointer dereference vulnerability exists in the Distributed Transaction component of Bloomberg Comdb2 8
A null pointer dereference vulnerability exists in the Distributed Transaction component of Bloomberg Comdb2 8
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An out-of-bounds read vulnerability exists in the RLECodec::DecodeByStreams functionality of Grassroot DICOM 3
An out-of-bounds read vulnerability exists in the RLECodec::DecodeByStreams functionality of Grassroot DICOM 3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The privileged user could log in without sufficient credentials after enabling an application protocol
The privileged user could log in without sufficient credentials after enabling an application protocol
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Arbitrary code execution is possible due to improper validation of the file upload functionality in Eaton BLSS
Arbitrary code execution is possible due to improper validation of the file upload functionality in Eaton BLSS
Executive Summary:
A high-severity vulnerability has been identified in multiple Arbitrary products, which could allow a remote attacker to execute arbitrary code and take full control of an affected system. This flaw stems from improper security checks in the file upload functionality, posing a significant risk of data breaches, system compromise, and operational disruption. Immediate patching is required to mitigate this critical threat.
Vulnerability Details
CVE-ID: CVE-2025-48396
Affected Software: Arbitrary Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability exists within the file upload functionality of the affected products. The software fails to properly validate the type, content, or extension of files being uploaded, allowing a remote attacker to upload a malicious file, such as a web shell. Once uploaded, the attacker can then navigate to the file's location on the server, causing it to be executed with the privileges of the web server process. This provides the attacker with a foothold on the system, enabling them to execute arbitrary commands, access sensitive data, and potentially pivot to other systems on the network.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.3. Successful exploitation could lead to a complete compromise of the affected system. The business impact includes the potential for significant data breaches, theft of sensitive intellectual property or customer information, and service disruption. An attacker could also use the compromised system as a launchpad for further attacks within the corporate network, leading to widespread system compromise and severe reputational damage.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected systems without delay. Before patching, organizations should ensure they have tested backups. After patching, it is crucial to monitor systems for any signs of post-patch exploitation attempts and review historical access logs for indicators of compromise prior to the patch application.
Proactive Monitoring: Security teams should actively monitor for unusual file uploads, particularly files with executable extensions (e.g., .php, .jsp, .aspx) being written to web-accessible directories. Review web server and application logs for suspicious POST requests, direct access attempts to unexpected files, and the spawning of new processes (like cmd.exe or /bin/sh) by the web server user. Network traffic analysis can help detect command-and-control (C2) communication originating from compromised servers.
Compensating Controls: If immediate patching is not feasible, consider implementing compensating controls. This includes restricting access to the file upload functionality to trusted users only, using a Web Application Firewall (WAF) with rules to inspect and block malicious file uploads, and implementing file integrity monitoring on web server directories to detect the creation of unauthorized files. Additionally, ensure the web server process runs with the lowest possible privileges to limit the impact of a potential compromise.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 3, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the nature of arbitrary code execution vulnerabilities, proof-of-concept exploits are likely to be developed quickly by security researchers and threat actors. The vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Given the high severity rating (CVSS 8.3) and the critical impact of arbitrary code execution, we strongly recommend that organizations prioritize the immediate deployment of vendor-supplied patches to all affected systems. While this vulnerability is not yet listed in the CISA KEV catalog, its high potential for exploitation means proactive patching is essential to prevent a full system compromise. Organizations should treat this as a critical priority and follow the outlined remediation and monitoring steps to mitigate risk.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability in Apache IoTDB
A vulnerability in Apache IoTDB
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full acce...
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Deadline: September 14, 2025
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Cross-Site Request Forgery (CSRF) vulnerability in thaihavnn07 ATT YouTube Widget allows Stored XSS
Cross-Site Request Forgery (CSRF) vulnerability in thaihavnn07 ATT YouTube Widget allows Stored XSS
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Cross-Site Request Forgery (CSRF) vulnerability in dactum Clickbank WordPress Plugin (Niche Storefront) allows Stored XSS
Cross-Site Request Forgery (CSRF) vulnerability in dactum Clickbank WordPress Plugin (Niche Storefront) allows Stored XSS
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
Cross-Site Request Forgery (CSRF) vulnerability in PluginsPoint Kento Splash Screen allows Stored XSS
Cross-Site Request Forgery (CSRF) vulnerability in PluginsPoint Kento Splash Screen allows Stored XSS
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in arisoft Contact Form 7 Editor Button allows Refl...
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in arisoft Contact Form 7 Editor Button allows Reflected XSS
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Cross-Site Request Forgery (CSRF) vulnerability in Aaron Axelsen WPMU Ldap Authentication allows Stored XSS
Cross-Site Request Forgery (CSRF) vulnerability in Aaron Axelsen WPMU Ldap Authentication allows Stored XSS
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Kevon Adonis WP Abstracts wp-...
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Kevon Adonis WP Abstracts wp-abstracts-manuscripts-manager allows PHP Local File Inclusion
Executive Summary:
A high-severity vulnerability has been identified in multiple Kevon Adonis WP products, specifically affecting the wp-abstracts-manuscripts-manager plugin. This flaw, a Local File Inclusion (LFI), could allow an unauthenticated remote attacker to read sensitive files on the server, potentially exposing confidential data such as database credentials, system configurations, and user information. Organizations are urged to apply the vendor-supplied security updates immediately to mitigate the risk of a data breach.
Vulnerability Details
CVE-ID: CVE-2025-48338
Affected Software: Kevon Adonis WP Abstracts wp-abstracts-manuscripts-manager
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability exists due to improper input validation on a parameter used in a PHP include or require statement. An attacker can manipulate this parameter to specify an arbitrary file path on the server's local filesystem. By crafting a malicious request containing directory traversal sequences (e.g., ../../), the attacker can trick the application into including and displaying the contents of sensitive files, such as wp-config.php, /etc/passwd, or other application source code, that are outside of the intended web root directory.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Successful exploitation could lead to a significant data breach, as attackers can exfiltrate sensitive information directly from the server. The primary business risks include the compromise of database credentials leading to full database access, theft of intellectual property, exposure of customer or user data, and reputational damage. This initial foothold could also be leveraged by an attacker to discover other vulnerabilities and escalate their privileges on the host system.
Remediation Plan
Immediate Action:
Proactive Monitoring:
../, ..%2f, or absolute file paths in URL parameters.Compensating Controls:
open_basedir) to restrict the locations from which files can be included.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of October 23, 2025, there is no known public proof-of-concept exploit code, and the vulnerability is not listed on CISA's Known Exploited Vulnerabilities (KEV) catalog. However, LFI vulnerabilities in WordPress plugins are common targets for threat actors, and it is highly likely that exploits will be developed and used in the near future. The CVE description title mentions 'Remote File Inclusion' but the description specifies 'Local File Inclusion'; analysis indicates the primary threat is LFI.
Analyst Recommendation
Given the high severity (CVSS 7.5) and the critical nature of the data that can be exposed, this vulnerability presents a significant risk. Although there is no evidence of active exploitation at this time, organizations must not delay remediation. We strongly recommend that all available vendor patches for CVE-2025-48338 be applied immediately as a top priority to prevent potential data breaches and system compromise.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A high-severity vulnerability has been discovered in multiple startAlwaysOnVpn products, identified as CVE-2025-48588. This flaw could allow an unauthenticated remote attacker to execute arbitrary commands on the affected VPN gateway, potentially leading to a complete compromise of the device and unauthorized access to the internal corporate network. Organizations are urged to apply vendor-supplied security patches immediately to mitigate the significant risk of a network breach.
Vulnerability Details
CVE-ID: CVE-2025-48588
Affected Software: startAlwaysOnVpn Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is a command injection flaw within the
startAlwaysOnVpncomponent. The component fails to properly sanitize user-supplied input when processing connection initiation requests. A remote, unauthenticated attacker can craft a malicious request containing specially formatted command strings, which are then executed by the underlying operating system with the privileges of the VPN service. Successful exploitation allows the attacker to run arbitrary commands on the VPN gateway, effectively gaining control over the device.Business Impact
This vulnerability presents a significant risk to the organization, classified as High severity with a CVSS score of 7.8. The VPN gateway is a critical perimeter security device that protects the internal network. Exploitation of this flaw could lead to severe consequences, including unauthorized access to sensitive internal data, lateral movement by attackers into the corporate network, deployment of ransomware, and disruption of remote access for all employees. A compromise of the VPN gateway would effectively dismantle a key part of the organization's security posture, leading to potential data breaches, financial loss, and reputational damage.
Remediation Plan
Immediate Action: The primary and most effective remediation is to apply the security updates provided by the vendor immediately across all affected VPN devices. After patching, system administrators should monitor for any signs of exploitation attempts by reviewing VPN service logs, system logs, and network traffic for anomalies.
Proactive Monitoring: Security teams should actively monitor for indicators of compromise. This includes looking for unusual processes spawned by the VPN service, unexpected outbound connections from the VPN gateway to unknown IP addresses, and error messages in logs that may indicate malformed connection attempts. Configure SIEM alerts for command-line activity or process creation originating from the VPN daemon.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the attack surface. Restrict access to the VPN gateway's management interface to a trusted administrative network. Employ an Intrusion Prevention System (IPS) with signatures designed to detect and block command injection attacks. Enhance network segmentation to limit the potential impact of a compromised VPN gateway, preventing it from accessing critical internal servers.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 8, 2025, there are no known public exploits for this vulnerability. However, given the high severity and the critical function of the affected products, it is highly probable that threat actors will actively work to reverse-engineer the patch and develop a functional exploit. Organizations should operate under the assumption that exploitation will occur in the near future.
Analyst Recommendation
Given the high CVSS score of 7.8 and the critical role of VPN gateways in network security, this vulnerability requires immediate attention. Although CVE-2025-48588 is not currently on the CISA KEV list, its potential for enabling unauthorized remote access makes it an attractive target for attackers. We strongly recommend that organizations prioritize the deployment of the vendor-supplied patches to all affected systems within the next 72 hours to prevent potential compromise of the network perimeter.