CVE-2025-48611

the affected software · DeviceId.java

A desync in persistence within DeviceId.java, caused by a missing bounds check, allows for local escalation of privilege without requiring user interaction.

Executive summary

A critical flaw in the DeviceId component allows for local escalation of privilege, enabling an attacker to gain elevated system permissions without any user interaction.

Vulnerability

The vulnerability exists due to a missing bounds check in the persistence logic of DeviceId.java. This results in a synchronization error (desync) that can be exploited by a local attacker to escalate their privileges to a higher level; notably, this exploit requires no additional execution privileges or user interaction to succeed.

Business impact

The impact of this vulnerability is significant, as reflected by its CVSS score of 10.0. A local attacker can gain full control over the affected device, potentially accessing sensitive data, installing persistent malware, or bypassing security boundaries. This poses a direct threat to the confidentiality and integrity of the device and any corporate data residing on it.

Remediation

Immediate Action: Apply the latest security patches provided by the software vendor to address the bounds check failure in DeviceId.java.

Proactive Monitoring: Monitor system logs for unusual privilege escalation events or unauthorized modifications to device identity persistence files.

Compensating Controls: Restrict the ability of untrusted applications to execute locally and utilize endpoint detection and response (EDR) tools to identify anomalous behavior.

Exploitation status

Public Exploit Available: No

Analyst recommendation

This vulnerability represents the highest possible technical risk. Administrators should identify all devices running the affected software and apply the vendor-supplied update immediately. Failure to patch may result in total device compromise by a local malicious actor.