Description
Improper verification of intent by broadcast receiver in Settings prior to SMR Mar-2026 Release 1 allows local attacker to launch arbitrary activity with Settings privilege. User interaction is required for triggering this vulnerability.
Published: 2026-03-16
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local privilege escalation
Action: Apply patch
AI Analysis

Impact

Improper verification of intent by a broadcast receiver in the Android Settings app allows a local attacker to launch an arbitrary activity with Settings‐level privileges, enabling privileged actions such as modifying system settings or accessing sensitive information. The flaw stems from the Settings broadcast receiver not properly validating the intent it receives, which grants the attacker elevated capabilities on the device. This is a local privilege escalation vulnerability that requires the attacker to have access to the device but does not immediately compromise remote systems.

Affected Systems

Samsung Mobile Devices running Android 16.0 and any SMR release prior to SMR Mar‑2026 Release 1 are affected. The affected updates include SMR‑Sep‑2025‑R1 through SMR‑Feb‑2026‑R1, as listed in the Common Platform Enumeration data. Users on these devices should check Samsung’s security update page for the March 2026 release to determine if their device is vulnerable.

Risk and Exploitability

The CVSS score of 6.8 denotes moderate severity, and the EPSS score of less than 1% indicates a low overall likelihood of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires a local attacker who can send a crafted broadcast intent to the Settings app and the user to interact with the trigger; the typical attack vector would involve a malicious application or script that posts the invalid intent, which the Settings receiver authorizes without proper checks. While the attack is local and requires user interaction, the potential to gain Settings privileges represents a significant risk to device security.

Generated by OpenCVE AI on March 20, 2026 at 15:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Samsung Mobile security update page for SMR Mar‑2026 Release 1
  • Install the security update to resolve the intent verification issue
  • If an update cannot be applied, avoid interacting with unfamiliar apps that may broadcast Settings intents

Generated by OpenCVE AI on March 20, 2026 at 15:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Title Improper Intent Verification in Android Settings Enables Local Privilege Escalation

Fri, 20 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Samsung
Samsung android
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:o:samsung:android:16.0:-:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-aug-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-dec-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-feb-2026-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-jan-2026-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-nov-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-oct-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-sep-2025-r1:*:*:*:*:*:*
Vendors & Products Samsung
Samsung android
Metrics cvssV3_1

{'score': 5.0, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}


Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Samsung Mobile
Samsung Mobile samsung Mobile Devices
Vendors & Products Samsung Mobile
Samsung Mobile samsung Mobile Devices

Mon, 16 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 04:45:00 +0000

Type Values Removed Values Added
Description Improper verification of intent by broadcast receiver in Settings prior to SMR Mar-2026 Release 1 allows local attacker to launch arbitrary activity with Settings privilege. User interaction is required for triggering this vulnerability.
References
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Samsung Android
Samsung Mobile Samsung Mobile Devices
cve-icon MITRE

Status: PUBLISHED

Assigner: SamsungMobile

Published:

Updated: 2026-03-17T03:55:31.506Z

Reserved: 2025-12-11T01:33:35.800Z

Link: CVE-2026-20988

cve-icon Vulnrichment

Updated: 2026-03-16T13:16:16.771Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:18:09.457

Modified: 2026-03-20T14:29:28.470

Link: CVE-2026-20988

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:00:34Z

Weaknesses