Description
Path traversal in ShortcutService prior to SMR Feb-2026 Release 1 allows privileged local attacker to create file with system privilege.
Published: 2026-02-04
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local privilege escalation via file creation
Action: Immediate Patch
AI Analysis

Impact

This vulnerability is a path traversal flaw in Android's ShortcutService that exists in firmware releases prior to the SMR Feb-2026 Release 1. A privileged local attacker can craft a shortcut that points to an arbitrary path, causing the system to create a file with system privileges. This can be leveraged to write malicious binaries or configuration files that persist with elevated privileges, potentially enabling further code execution or persistence on the device.

Affected Systems

The flaw affects Samsung Mobile Devices running Android 14, Android 15, and Android 16 versions that have received service release or maintenance releases prior to SMR Feb‑2026 Release 1. The vulnerability is present in all build variants that include the unpatched ShortcutService component.

Risk and Exploitability

The CVSS score for this weakness is 6.8, indicating moderate severity. The EPSS score is reported as less than 1 %, suggesting that exploitation is currently unlikely, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires a local privilege, meaning the attacker must already have privileged access to the device or be a local user with sufficient rights to create shortcuts. Despite the low exploitation probability, the impact remains significant due to the potential for persistent privilege escalation.

Generated by OpenCVE AI on April 18, 2026 at 18:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Samsung security update that includes the Patch for the ShortcutService path traversal flaw.
  • If a device update is not possible, disable or uninstall the ShortcutService component, or prevent privileged users from creating shortcuts via device settings or app restrictions.
  • Restrict local user privileges so that only trusted system users can create shortcuts, thereby limiting the attack surface for the path traversal flaw.

Generated by OpenCVE AI on April 18, 2026 at 18:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Title Path Traversal in Android ShortcutService Allows File Creation with System Privileges

Thu, 05 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Samsung android
Weaknesses CWE-22
CPEs cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-apr-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-aug-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-dec-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-dec-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-feb-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jan-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jan-2026-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jul-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jun-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-mar-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-may-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-nov-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-nov-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-oct-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-sep-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:-:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-apr-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-aug-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-dec-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-feb-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-jan-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-jan-2026-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-jul-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-jun-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-mar-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-may-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-nov-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-oct-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-sep-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:-:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-aug-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-dec-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-jan-2026-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-nov-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-oct-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-sep-2025-r1:*:*:*:*:*:*
Vendors & Products Samsung android
Metrics cvssV3_1

{'score': 6.0, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L'}


Wed, 04 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Samsung
Samsung mobile Devices
Vendors & Products Samsung
Samsung mobile Devices

Wed, 04 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 06:45:00 +0000

Type Values Removed Values Added
Description Path traversal in ShortcutService prior to SMR Feb-2026 Release 1 allows privileged local attacker to create file with system privilege.
References
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Samsung Android Mobile Devices
cve-icon MITRE

Status: PUBLISHED

Assigner: SamsungMobile

Published:

Updated: 2026-02-04T16:56:51.388Z

Reserved: 2025-12-11T01:33:35.799Z

Link: CVE-2026-20982

cve-icon Vulnrichment

Updated: 2026-02-04T16:56:49.176Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-04T07:16:00.240

Modified: 2026-02-05T21:20:12.127

Link: CVE-2026-20982

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:45:05Z

Weaknesses