Description
In writeToParcel of WindowInfo.cpp, there is a possible way to trick a user into accepting a permission due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Published: 2026-03-02
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the WindowInfo.cpp writeToParcel function, where an attacker can craft a malicious payload that tricks a legitimate application into granting a permission through a tapjacking or overlay attack. The flaw allows elevation of local privileges without requiring the victim to execute any additional code. This is a high‑severity flaw that could let a non‑privileged user gain administrative privileges on the device, impacting confidentiality, integrity, and availability of system resources.

Affected Systems

Google Android versions 14.0, 15.0, and 16.0 are affected. Any device running these versions of the operating system is potentially vulnerable to the exploit if it accepts the manipulated permission request.

Risk and Exploitability

The vulnerability is rated 7.8 on the CVSS scale, indicating a high severity. Exploit probability is very low, with an EPSS score of less than 1%. The issue is not currently listed in the CISA KEV catalog. Based on the description, the attack path likely involves a local user or an application with overlay capabilities; user interaction is not required for exploitation, meaning the attacker could trigger the payload without explicit victim action, although the exact conditions may necessitate an active session or a running application that can display overlays.

Generated by OpenCVE AI on April 16, 2026 at 05:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest Android OS update that contains the fix for this issue
  • Restart the device to ensure the update is fully applied
  • Periodically check for new security advisories related to Android to stay protected

Generated by OpenCVE AI on April 16, 2026 at 05:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Title WindowInfo Permission Trick as Tapjacking Enables Local Privilege Escalation

Fri, 06 Mar 2026 04:30:00 +0000

Type Values Removed Values Added
References

Fri, 06 Mar 2026 04:15:00 +0000

Type Values Removed Values Added
References

Tue, 03 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Tue, 03 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
Weaknesses CWE-1021
CPEs cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:16.0:-:*:*:*:*:*:*
Vendors & Products Google
Google android
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}


Mon, 02 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description In writeToParcel of WindowInfo.cpp, there is a possible way to trick a user into accepting a permission due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published:

Updated: 2026-03-11T15:02:50.936Z

Reserved: 2025-10-15T15:38:30.196Z

Link: CVE-2026-0007

cve-icon Vulnrichment

Updated: 2026-03-03T15:30:21.445Z

cve-icon NVD

Status : Modified

Published: 2026-03-02T19:16:29.250

Modified: 2026-03-06T04:16:02.987

Link: CVE-2026-0007

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T06:00:10Z

Weaknesses