Description
In modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
Published: 2026-03-10
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Now
AI Analysis

Impact

This flaw lies in the modem component of the Android operating system and originates from an incorrect bounds check that permits an out‑of‑bounds write. The resulting memory corruption can be used by an attacker to execute arbitrary code with the same privileges as the system process that owns the vulnerable component, allowing full compromise of the device. The defect is classified as a classic buffer overflow issue (CWE‑787).

Affected Systems

Google Android is the only affected vendor listed. No exact Android release or build numbers are specified in the advisory, so any device running a version that contains the unpatched modem code is potentially affected. Users of Pixel devices are referenced in the official security bulletin, implying the issue may span the Pixel line but is not limited to it.

Risk and Exploitability

The vulnerability has a CVSS score of 9.8, indicating a critical severity. The EPSS score is under 1 %, meaning that, although theoretically exploitable from the internet, the likelihood of an active attack is very low at this time. The flaw is not yet part of the CISA Known Exploited Vulnerabilities catalog, so there are no documented exploits in the wild. The attack does not require user interaction and can be triggered remotely, which underscores the need for an immediate patch once one is available. Users should anticipate that vendors typically release an OTA update within the next security bulletin cycle. Until a fix is installed, the risk of compromise persists for all affected devices.

Generated by OpenCVE AI on April 16, 2026 at 03:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Android security patch from Google
  • Verify that the modem firmware component is updated to the patched version
  • Implement network segmentation or firewall rules to restrict external access to modem services as a temporary countermeasure

Generated by OpenCVE AI on April 16, 2026 at 03:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
Vendors & Products Google
Google android

Tue, 10 Mar 2026 22:30:00 +0000

Type Values Removed Values Added
References

Tue, 10 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
References

Tue, 10 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description In modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Google_Devices

Published:

Updated: 2026-03-12T03:55:17.065Z

Reserved: 2025-10-23T08:43:18.285Z

Link: CVE-2026-0120

cve-icon Vulnrichment

Updated: 2026-03-11T13:49:58.336Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T21:16:45.480

Modified: 2026-03-11T16:47:39.150

Link: CVE-2026-0120

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T03:30:06Z

Weaknesses