Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0014: Denial of service in Google Android

0
Medium
VulnerabilityCVE-2026-0014cvecve-2026-0014
Published: Mon Mar 02 2026 (03/02/2026, 18:42:39 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In isPackageNullOrSystem of AppOpsService.java, there is a possible persistent denial of service due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 03/02/2026, 19:07:32 UTC

Technical Analysis

CVE-2026-0014 is a denial of service vulnerability found in the Android operating system, specifically within the AppOpsService.java file's isPackageNullOrSystem function. The vulnerability stems from improper input validation, which allows an attacker to supply malformed or unexpected input that causes the service to crash or enter an unstable state. This results in a persistent denial of service condition that affects the availability of the affected Android device. The attack vector is local, meaning the attacker must have local access to the device, but does not require any additional execution privileges or user interaction, which lowers the barrier for exploitation. The affected Android versions include 14, 15, 16, and 16-qpr2, covering a broad range of recent Android releases. The vulnerability does not currently have a CVSS score, and no public exploits have been reported. However, the flaw's nature suggests it could be leveraged to disrupt device functionality persistently, potentially impacting critical services running on the device. The root cause is a lack of proper input validation in the AppOpsService component, which is responsible for managing application operation permissions and system package checks. Without proper validation, malformed inputs can cause the service to fail, leading to denial of service. The vulnerability is classified as local and does not require user interaction, increasing the risk of automated or scripted exploitation by local attackers.

Potential Impact

The primary impact of CVE-2026-0014 is the loss of availability of affected Android devices due to persistent denial of service conditions. This can disrupt normal device operations, potentially affecting users' ability to use applications or system services that rely on AppOpsService. For organizations, especially those relying on Android devices for critical communications, mobile workforce management, or IoT deployments, this vulnerability could lead to operational disruptions. Since no elevated privileges are required, any local user or malicious app with local access could exploit this flaw to degrade device functionality. This could be particularly damaging in environments where device uptime is critical, such as healthcare, finance, or industrial control systems using Android-based devices. Although the vulnerability does not directly impact confidentiality or integrity, the denial of service could be leveraged as part of a broader attack chain to create distractions or cover other malicious activities. The lack of user interaction requirement increases the risk of automated exploitation in compromised environments.

Mitigation Recommendations

To mitigate CVE-2026-0014, organizations and users should apply security patches provided by Google or device manufacturers as soon as they become available. Until patches are released, restricting local access to devices can reduce the risk of exploitation; this includes enforcing strong device lock mechanisms, limiting physical access, and controlling app installation privileges to prevent malicious local apps. Monitoring device logs for abnormal crashes or service disruptions related to AppOpsService can help detect potential exploitation attempts. Developers and security teams should audit input validation routines in custom Android builds or apps interacting with system services to ensure robust handling of unexpected inputs. Employing mobile device management (MDM) solutions to enforce security policies and restrict local user capabilities can further reduce risk. Additionally, educating users about the risks of installing untrusted applications and maintaining updated device firmware will help mitigate exploitation vectors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-10-15T15:38:45.196Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a5db80d1a09e29cb1cb9bd

Added to database: 3/2/2026, 6:48:32 PM

Last enriched: 3/2/2026, 7:07:32 PM

Last updated: 3/3/2026, 4:38:59 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses