Description
In createRequest of MediaProvider.java, there is a possible way for an app to gain read/write access to non-existing files due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Published: 2026-03-02
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

The flaw is found in Android’s MediaProvider implementation where an application can request read or write access to files that do not actually exist. This logic error does not require any special execution privileges or user interaction, allowing a local attacker to elevate privileges and gain read/write access to unauthorized file paths. The weakness is a form of buffer underflow or out-of-bounds access delineated by CWE-125 and a memory corruption vulnerability described by CWE-787. The potential impact includes unauthorized file manipulation, data compromise, and the ability for a malicious local app to perform operations beyond its intended scope.

Affected Systems

Android devices running versions 14.0 and 15.0, as well as Android 16.0 including the official release and the QPR2 beta series (beta 1, beta 2, and beta 3). These versions are identified through vendor/product listings that match the impacted Android releases.

Risk and Exploitability

The vulnerability scores a CVSS of 8.4, indicating high severity. EPSS is less than 1%, showing a very low current exploit probability, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The CVE description indicates that exploitation does not require user interaction; therefore, it can be triggered by a local attacker who can install or run a malicious application under the device’s current user context. This inference is based on the absence of additional prerequisites in the description. Organizations should treat this with high urgency, particularly when devices are exposed to untrusted applications.

Generated by OpenCVE AI on April 17, 2026 at 13:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Android security update that contains the fix for MediaProvider
  • Ensure the device’s operating system is updated to Android 16.0 or newer with the corresponding patch
  • Limit installation of applications that request access to the media provider until the fix is deployed

Generated by OpenCVE AI on April 17, 2026 at 13:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
Title Android MediaProvider Local Privilege Escalation via Non-Existing File Access

Fri, 06 Mar 2026 04:30:00 +0000

Type Values Removed Values Added
References

Fri, 06 Mar 2026 04:15:00 +0000

Type Values Removed Values Added
References

Tue, 03 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
CPEs cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:16.0:-:*:*:*:*:*:*
cpe:2.3:o:google:android:16.0:qpr2_beta_1:*:*:*:*:*:*
cpe:2.3:o:google:android:16.0:qpr2_beta_2:*:*:*:*:*:*
cpe:2.3:o:google:android:16.0:qpr2_beta_3:*:*:*:*:*:*
Vendors & Products Google
Google android

Mon, 02 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
CWE-787
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description In createRequest of MediaProvider.java, there is a possible way for an app to gain read/write access to non-existing files due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published:

Updated: 2026-03-06T03:57:08.667Z

Reserved: 2025-10-15T15:39:20.653Z

Link: CVE-2026-0035

cve-icon Vulnrichment

Updated: 2026-03-02T20:30:16.467Z

cve-icon NVD

Status : Modified

Published: 2026-03-02T19:16:31.657

Modified: 2026-03-06T04:16:06.643

Link: CVE-2026-0035

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T13:45:16Z

Weaknesses