CVE-2025-48611
the affected software · DeviceId.java
A desync in persistence within DeviceId.java, caused by a missing bounds check, allows for local escalation of privilege without requiring user interaction.
Executive summary
A critical flaw in the DeviceId component allows for local escalation of privilege, enabling an attacker to gain elevated system permissions without any user interaction.
Vulnerability
The vulnerability exists due to a missing bounds check in the persistence logic of DeviceId.java. This results in a synchronization error (desync) that can be exploited by a local attacker to escalate their privileges to a higher level; notably, this exploit requires no additional execution privileges or user interaction to succeed.
Business impact
The impact of this vulnerability is significant, as reflected by its CVSS score of 10.0. A local attacker can gain full control over the affected device, potentially accessing sensitive data, installing persistent malware, or bypassing security boundaries. This poses a direct threat to the confidentiality and integrity of the device and any corporate data residing on it.
Remediation
Immediate Action: Apply the latest security patches provided by the software vendor to address the bounds check failure in DeviceId.java.
Proactive Monitoring: Monitor system logs for unusual privilege escalation events or unauthorized modifications to device identity persistence files.
Compensating Controls: Restrict the ability of untrusted applications to execute locally and utilize endpoint detection and response (EDR) tools to identify anomalous behavior.
Exploitation status
Public Exploit Available: No
Analyst recommendation
This vulnerability represents the highest possible technical risk. Administrators should identify all devices running the affected software and apply the vendor-supplied update immediately. Failure to patch may result in total device compromise by a local malicious actor.