Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0013: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2026-0013cvecve-2026-0013
Published: Mon Mar 02 2026 (03/02/2026, 18:42:38 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In setupLayout of PickActivity.java, there is a possible way to start any activity as a DocumentsUI app due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 16:54:56 UTC

Technical Analysis

CVE-2026-0013 is a vulnerability identified in the Android operating system affecting versions 14, 15, and 16. The issue stems from a confused deputy problem in the setupLayout function within PickActivity.java, part of the DocumentsUI app framework. A confused deputy vulnerability occurs when a privileged component is tricked into misusing its authority on behalf of a less privileged actor. In this case, the flaw allows an attacker to start arbitrary activities with the privileges of the DocumentsUI app without needing any additional execution privileges or user interaction. This means a local attacker with access to the device can escalate their privileges to gain higher-level access, potentially compromising system confidentiality, integrity, and availability. The vulnerability is classified under CWE-441 (Incorrect Resource Transfer Between Spheres), indicating improper handling of authority delegation. The CVSS v3.1 base score is 8.4, reflecting high severity due to low attack complexity, no required privileges or user interaction, and a broad impact on confidentiality, integrity, and availability. Although no public exploits are reported yet, the vulnerability's nature makes it a significant risk for local attackers aiming to elevate privileges silently. The lack of available patches at the time of reporting necessitates proactive mitigation strategies.

Potential Impact

The impact of CVE-2026-0013 is substantial for organizations and individuals using affected Android versions. Successful exploitation allows local attackers to escalate privileges without user interaction or additional permissions, potentially leading to full system compromise. This could enable unauthorized access to sensitive data, installation of persistent malware, or disruption of device functionality. For enterprises relying on Android devices for critical operations, such a vulnerability could facilitate lateral movement within networks, data exfiltration, or sabotage of mobile endpoints. The vulnerability undermines the security boundary between user-level and privileged processes, increasing the attack surface for insider threats or malware that gains initial foothold with limited rights. Given Android's widespread use in consumer, enterprise, and government sectors, the threat could have broad implications, especially in environments where devices are shared or physically accessible by untrusted users.

Mitigation Recommendations

To mitigate CVE-2026-0013, organizations and users should prioritize installing official security updates from Google as soon as they become available for affected Android versions. In the absence of patches, restricting physical and local access to devices is critical to prevent exploitation by local attackers. Employing device encryption and strong authentication mechanisms can reduce the risk of unauthorized local access. Administrators should audit and limit app permissions, especially those related to DocumentsUI and activity launching capabilities. Implementing mobile device management (MDM) solutions can help enforce security policies and monitor for suspicious activity indicative of privilege escalation attempts. Additionally, developers and security teams should review custom Android builds or OEM modifications for similar confused deputy patterns and apply secure coding practices to prevent authority misuse. Regularly monitoring threat intelligence feeds for emerging exploits related to this CVE will enable timely response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-10-15T15:38:43.799Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a5db80d1a09e29cb1cb9ba

Added to database: 3/2/2026, 6:48:32 PM

Last enriched: 3/10/2026, 4:54:56 PM

Last updated: 4/16/2026, 3:15:06 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses