Description
In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Published: 2026-03-02
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Patch
AI Analysis

Impact

In the Android kernel's mem_protect.c component, a logic flaw permits an out‑of‑bounds write that corrupts kernel memory. The corruption can be controlled by a local actor to gain privileged execution, effectively elevating their privileges from ordinary user to kernel level. This vulnerability is classified as a local privilege escalation and is identified as CWE‑269 and CWE‑787.

Affected Systems

The flaw is present in the Android operating system kernel code shipped by Google. No specific Android release or kernel version has been identified in the advisory, implying that any device running the unpatched mem_protect.c implementation is vulnerable. The vulnerability affects all Android devices that use the affected kernel without the official security update.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity for a local vulnerability. The EPSS score is below 1%, suggesting that exploitation is currently unlikely. The issue is not listed in the CISA KEV catalog and requires no user interaction, meaning a local attacker with code execution capabilities can execute the exploit automatically once the device is compromised.

Generated by OpenCVE AI on April 16, 2026 at 14:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Android OTA security patch that includes the mem_protect.c fix; the patch is typically delivered through the device’s system update service.
  • Reboot the device after installing the patch to load the updated kernel and verify that the vulnerability is mitigated.
  • If the patch cannot be applied immediately, restrict privileged operations for untrusted applications through device policy management and disable USB debugging to reduce the risk of local code execution.

Generated by OpenCVE AI on April 16, 2026 at 14:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
Title Android Kernel Out‑of‑Bounds Write Leading to Local Privilege Escalation

Fri, 06 Mar 2026 04:30:00 +0000

Type Values Removed Values Added
References

Fri, 06 Mar 2026 04:15:00 +0000

Type Values Removed Values Added
References

Tue, 03 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
Weaknesses CWE-787
CPEs cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
Vendors & Products Google
Google android

Tue, 03 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-269
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published:

Updated: 2026-03-11T15:01:19.214Z

Reserved: 2025-10-15T15:39:15.518Z

Link: CVE-2026-0032

cve-icon Vulnrichment

Updated: 2026-03-03T14:39:07.771Z

cve-icon NVD

Status : Modified

Published: 2026-03-02T19:16:31.440

Modified: 2026-03-06T04:16:06.297

Link: CVE-2026-0032

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T14:30:16Z

Weaknesses