Description
There is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Published: 2026-03-10
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Assess Impact
AI Analysis

Impact

The vulnerability arises from a missing bounds check that permits an out‑of‑bounds write in the Android operating system, allowing an attacker to acquire higher privileges on the device without needing any additional execution rights. Because the flaw does not require user interaction, a local attacker with basic device access can exploit it to gain elevated privileges and potentially control protected system resources. This can lead to complete system takeover if leveraged further.

Affected Systems

All Google Android operating system builds may be affected; the vulnerability is not limited to a specific product version or family, but no version information is provided in the available data.

Risk and Exploitability

The CVSS score of 10.0 signals maximum severity, indicating that exploitation would provide full privilege escalation. The EPSS score of less than 1% suggests that, as of now, there is a low probability of widespread exploitation, although the lack of user interaction requirement increases the risk to any device with local access. The vulnerability is not listed in CISA’s KEV catalog, but its high severity warrants careful monitoring and timely remediation.

Generated by OpenCVE AI on April 16, 2026 at 09:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Android security patch from Google that fixes the missing bounds check
  • If a patch is not yet available for your device, treat the device as compromised for local privilege escalation and consider disabling it or resetting to factory settings until the patch is released
  • Limit the installation of unknown or unsigned applications and enforce strict permission policies to reduce the attack surface

Generated by OpenCVE AI on April 16, 2026 at 09:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
Title Android Out‑of‑Bounds Write Enabling Local Privilege Escalation

Wed, 11 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
Vendors & Products Google
Google android

Tue, 10 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description There is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Google_Devices

Published:

Updated: 2026-03-11T03:57:18.177Z

Reserved: 2025-10-23T08:43:23.949Z

Link: CVE-2026-0124

cve-icon Vulnrichment

Updated: 2026-03-10T21:08:09.207Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T21:16:45.900

Modified: 2026-03-11T17:13:25.993

Link: CVE-2026-0124

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:30:06Z

Weaknesses