Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0014: Denial of service in Google Android

0
Medium
VulnerabilityCVE-2026-0014cvecve-2026-0014
Published: Mon Mar 02 2026 (03/02/2026, 18:42:39 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In isPackageNullOrSystem of AppOpsService.java, there is a possible persistent denial of service due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 16:55:13 UTC

Technical Analysis

CVE-2026-0014 is a vulnerability identified in the Android operating system, specifically within the AppOpsService.java component's isPackageNullOrSystem function. The root cause is improper input validation (CWE-20), which allows an attacker to trigger a persistent denial of service condition locally. This means that by providing crafted input to the vulnerable function, an attacker can cause the affected Android device to become unresponsive or crash repeatedly, impacting system availability. The vulnerability affects Android versions 14, 15, 16, and 16-qpr2. Exploitation does not require any privileges (PR:N) or user interaction (UI:N), which lowers the barrier for local attackers to execute the attack. However, the attack vector is local (AV:L), so remote exploitation is not feasible. The CVSS v3.1 base score is 6.2, reflecting a medium severity level primarily due to the impact on availability (A:H) without affecting confidentiality or integrity. No known exploits have been reported in the wild, and no official patches have been linked yet, although Google has published the vulnerability details. The vulnerability could be leveraged by malicious apps or local users to disrupt device functionality persistently, potentially affecting user experience and device reliability.

Potential Impact

The primary impact of CVE-2026-0014 is a denial of service condition that affects the availability of Android devices running the specified versions. This can lead to device crashes or persistent unresponsiveness, which may disrupt business operations relying on mobile devices, especially in environments where Android devices are critical for communication, authentication, or operational tasks. Since no elevated privileges or user interaction are required, any local attacker or malicious app with access to the device could exploit this vulnerability to degrade device performance or cause repeated crashes. This could result in productivity loss, increased support costs, and potential operational downtime. However, the vulnerability does not compromise data confidentiality or integrity, limiting the scope of damage to availability. Organizations with large Android deployments, particularly in sectors such as finance, healthcare, and government, may face increased risk if devices are not updated promptly. The lack of remote exploitability reduces the threat surface but does not eliminate risk from insider threats or compromised local environments.

Mitigation Recommendations

1. Monitor for official patches or security updates from Google and apply them promptly once available to remediate the vulnerability. 2. Restrict local access to Android devices by enforcing strong device access controls, including biometric or PIN authentication, to prevent unauthorized local exploitation. 3. Limit installation of untrusted or potentially malicious applications by enforcing app whitelisting or using enterprise mobility management (EMM) solutions to control app sources. 4. Implement runtime monitoring on devices to detect abnormal app behavior or repeated crashes that may indicate exploitation attempts. 5. Educate users and administrators about the risk of local attacks and encourage reporting of unusual device behavior. 6. For high-security environments, consider isolating critical Android devices or using hardened device configurations to reduce local attack vectors. 7. Regularly audit device logs and system behavior to identify potential exploitation attempts early. 8. If feasible, temporarily restrict physical access to devices in sensitive environments until patches are applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-10-15T15:38:45.196Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a5db80d1a09e29cb1cb9bd

Added to database: 3/2/2026, 6:48:32 PM

Last enriched: 3/10/2026, 4:55:13 PM

Last updated: 4/21/2026, 8:33:14 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses