Loading HuntDB...

CVE-2025-48539

UNKNOWN
Published 2025-09-04T18:34:18.652Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-48539. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

In SendPacketToPeer of acl_arbiter.cc, there is a possible out of bounds read due to a use after free. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

Available Exploits

No exploits available for this CVE.

Related News

Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)

Google has provided fixes for over 100 Android vulnerabilities, including CVE-2025-48543 and CVE-2025-38352, which “may be under limited, targeted exploitation.” Among the fixed flaws is also CVE-2025-48539, a critical vulnerability in the System component th…

Help Net Security 2025-09-04 13:51

Affected Products

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

In SendPacketToPeer of acl_arbiter.cc, there is a possible out of bounds read due to a use after free. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

Affected Products (ENISA)

google
android

ENISA Scoring

CVSS Score (3.1)

8.0
/10
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS Score

0.010
probability

Data provided by ENISA EU Vulnerability Database. Last updated: September 6, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-f769-ghq4-665p

Advisory Details

In SendPacketToPeer of acl_arbiter.cc, there is a possible out of bounds read due to a use after free. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: September 4, 2025, Modified: September 4, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

2 posts
Reddit 2 days, 11 hours ago
crstux
Exploit Payload

🔥 Top 10 Trending CVEs (06/09/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-42957](https://nvd.nist.gov/vuln/detail/CVE-2025-42957)** - 📝 SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code …

2
2.0
View Original High Risk
Reddit 3 days, 11 hours ago
crstux
Exploit

🔥 Top 10 Trending CVEs (05/09/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-48539](https://nvd.nist.gov/vuln/detail/CVE-2025-48539)** - 📝 In SendPacketToPeer of acl_arbiter.cc, there is a possible out of bounds read due to a use after free. This could lead to remote (proximal/adjacent) code execution with no …

1
1.0
View Original High Risk

References

Published: 2025-09-04T18:34:18.652Z
Last Modified: 2025-09-04T18:34:18.652Z
Copied to clipboard!