PT-2025-39687 · Google · Android
Published
2025-09-26
·
Updated
2026-02-03
·
CVE-2025-48593
CVSS v2.0
10
10
High
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Android versions 13 through 16
Description
A critical zero-click remote code execution issue exists in the Android Bluetooth stack, specifically within the
bta hf client cb init function of bta hf client main.cc. This flaw is due to a use-after-free condition. Exploitation does not require user interaction; an attacker can trigger the issue by sending specially crafted network packets or malicious applications. Successful exploitation could grant an attacker full access to the device, potentially leading to data theft and the installation of ransomware. The vulnerability primarily affects devices acting as Bluetooth headphones, smartwatches, smart glasses, and cars. While some reports indicate a potential for remote takeover, proof-of-concept demonstrations suggest the issue primarily causes service crashes on devices functioning as Bluetooth accessories. The vulnerability is assigned a critical severity level of 9.8 out of 10.Recommendations
Update to the security patch level 2025-11-01 or newer.
If possible, temporarily disable the Bluetooth Hands-Free Profile (HFP) to reduce the risk of exploitation.
Avoid connecting to untrusted networks.
Enable Google Play Protect for enhanced security.
Exploit
Fix
RCE
Use After Free
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-13912
CVE-2025-48593
Affected Products
Android
References · 49
- 🔥 https://github.com/letchupkt/CVE-2025-48593⭐ 2 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-48593 · Security Note
- https://source.android.com/security/bulletin/2025-11-01 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-13912 · Security Note
- https://twitter.com/offseq/status/1990661638618267884 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1pdy9a9/cve202548633_and_cve202548572_android_framework · Reddit Post
- https://source.android.com/docs/security/bulletin/2025-11-01?hl=ru · Note
- https://android.googlesource.com/platform/packages/modules/Bluetooth/+/5ed63461b44198c80d5aff7e1af1df812f782abb · Note
- https://reddit.com/r/CVEWatch/comments/1otax1r/top_10_trending_cves_10112025 · Reddit Post
- https://twitter.com/ToHamalainen/status/1971549867840504147 · Twitter Post
- https://twitter.com/zhuowei/status/1995666982168133672 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1p5f8sx/cve202541115_a_maximumseverity_privilege · Reddit Post
- https://reddit.com/r/fairphone/comments/1oqufq7/no_security_patch_for_fairphone_despite_massive · Reddit Post
- https://reddit.com/r/SecOpsDaily/comments/1opbtuy/secopsdaily_20251105_roundup · Reddit Post
- https://worthdoingbadly.com/bluetooth · Reddit Post