A newly disclosed vulnerability in the Android Bluetooth stack which is being tracked as CVE-2025–48539 has security teams on high alert. The flaw, rated 8.0 on the CVSS scale, stems from a use-after-free condition in acl_arbiter.cc, specifically within the SendPacketToPeer function. A threat actor with adjacent network access can exploit the bug to trigger out-of-bounds reads and potentially execute arbitrary code without user interaction.
The vulnerability affects a wide range of Android devices running unpatched kernels, and has already been observed in targeted attacks against enterprise mobile fleets. Google’s September 2025 security bulletin confirms active exploitation in the wild.
Security researchers warn that the flaw bypasses traditional Bluetooth hardening techniques and may be chained with other privilege escalation vectors to gain full device control. The attack surface is particularly concerning for BYOD environments and mobile-first workforces.
“CVE-2025–48539 is a textbook example of how race conditions in low-level protocol handlers can become remote execution vectors. The fact that it’s zero-click and adjacent-access makes it ideal for stealthy lateral movement in mobile-heavy environments. Organisations should treat this as a high-priority patch and consider Bluetooth segmentation policies.”
Press enter or click to view image in full size
Press enter or click to view image in full size
Phase 1: Identification
Phase 2: Containment
Phase 3: Eradication
Phase 4: Recovery
Phase 5: Lessons Learned