Description
In MM_DATA_IND of cn_NrSmMsgHdlrFromMM.cpp, there is a possible EoP due to memory corruption. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Published: 2026-03-10
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

In the Android source file cn_NrSmMsgHdlrFromMM.cpp, a memory corruption issue exists in the MM_DATA_IND routine that can be exploited to bypass the end‑of‑process (EoP) check. This flaw allows an attacker to obtain escalated privileges on the device without needing any additional execution rights. The vulnerability is a classic buffer overflow (CWE-120). Since the flaw occurs during normal message handling, it may be triggered by external input without any user interaction.

Affected Systems

The vulnerability is present in the Google Android operating system. No version information was provided, so all releases that include the affected code path are potentially impacted. Devices running Android variants that include the cn_NrSmMsgHdlrFromMM.cpp component are at risk.

Risk and Exploitability

The score of 9.8 on the CVSS scale indicates a high severity level for privilege escalation. The EPSS value, rated below 1%, indicates a very low exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. The attack vector, while not directly stated, is inferred to be remote as the flaw can be triggered by an attacker sending crafted messages to the vulnerable component, with no user interaction required.

Generated by OpenCVE AI on April 17, 2026 at 11:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Android security update from Google that addresses the buffer overflow in the message handler.
  • Reboot the device to ensure the updated code is active.
  • As a temporary mitigation, disable the affected messaging component or apply system restrictions until the patch is applied. \nIf a patch cannot be applied immediately, employ kernel mitigations such as enabling stack canaries and address‑space randomization to reduce the risk of successful exploitation.

Generated by OpenCVE AI on April 17, 2026 at 11:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 12:00:00 +0000

Type Values Removed Values Added
Title Memory corruption in Android message handler allows privilege escalation with no user interaction

Thu, 12 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

Wed, 11 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
Vendors & Products Google
Google android

Tue, 10 Mar 2026 22:30:00 +0000

Type Values Removed Values Added
References

Tue, 10 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
References

Tue, 10 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description In MM_DATA_IND of cn_NrSmMsgHdlrFromMM.cpp, there is a possible EoP due to memory corruption. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Google_Devices

Published:

Updated: 2026-03-12T03:55:28.441Z

Reserved: 2025-10-23T08:43:02.755Z

Link: CVE-2026-0110

cve-icon Vulnrichment

Updated: 2026-03-11T14:48:16.792Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T21:16:44.447

Modified: 2026-03-11T17:14:10.313

Link: CVE-2026-0110

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T11:45:06Z

Weaknesses