Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0011: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2026-0011cvecve-2026-0011
Published: Mon Mar 02 2026 (03/02/2026, 18:42:36 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In enableSystemPackageLPw of Settings.java, there is a possible way to prevent location access from working due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 16:54:26 UTC

Technical Analysis

CVE-2026-0011 is a vulnerability identified in the Android operating system, specifically in the enableSystemPackageLPw method of the Settings.java file. The flaw is a logic error that can prevent proper functioning of location access controls, effectively allowing a local attacker to bypass intended restrictions. This leads to an elevation of privilege without requiring any additional execution privileges or user interaction, meaning an attacker with local access can exploit this vulnerability silently. The affected Android versions include 14, 15, 16, and 16-qpr2, covering a broad range of recent Android releases. The vulnerability is classified under CWE-693 (Protection Mechanism Failure) and CWE-703 (Improper Check or Handling of Exceptional Conditions), indicating weaknesses in security control logic and error handling. The CVSS v3.1 base score is 8.4, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. Although no public exploits have been reported, the flaw's nature suggests it could be leveraged for unauthorized access to sensitive location data or to escalate privileges on compromised devices. The absence of patch links suggests that fixes may still be pending or in development, emphasizing the need for vigilance and interim protective measures.

Potential Impact

The vulnerability allows local attackers to escalate privileges on affected Android devices, potentially gaining unauthorized access to sensitive location data and other protected system functions. This can compromise user privacy and device integrity, enabling further malicious activities such as installing persistent malware or bypassing security controls. The disruption of location access controls can also affect applications relying on accurate location data, impacting availability and reliability of services. Organizations relying on Android devices for critical operations, especially those handling sensitive or regulated data, face increased risk of data breaches and operational disruptions. The ease of exploitation without user interaction or elevated privileges broadens the threat scope, making even non-privileged local users a risk. This vulnerability could be exploited in targeted attacks against high-value individuals or organizations, or in mass compromise scenarios if combined with other vulnerabilities or malware delivery methods.

Mitigation Recommendations

Organizations and users should monitor official Google Android security advisories for patches addressing CVE-2026-0011 and apply updates promptly once available. Until patches are released, limiting local access to devices is critical; enforce strong device lock mechanisms and restrict physical and logical access to trusted users only. Employ mobile device management (MDM) solutions to enforce security policies and monitor for suspicious activities indicative of privilege escalation attempts. Disable or restrict unnecessary system packages and services that could be leveraged in exploitation. Conduct regular security audits and vulnerability assessments on Android devices in the environment. Educate users about the risks of granting local access to untrusted parties and the importance of applying updates. Consider implementing additional endpoint protection solutions capable of detecting anomalous privilege escalation behaviors. For high-security environments, consider isolating critical Android devices or using hardened Android builds with reduced attack surfaces.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-10-15T15:38:40.527Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a5db80d1a09e29cb1cb9b4

Added to database: 3/2/2026, 6:48:32 PM

Last enriched: 3/10/2026, 4:54:26 PM

Last updated: 4/20/2026, 3:27:20 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses