CVE-2026-0021: Elevation of privilege in Google Android
In hasInteractAcrossUsersFullPermission of AppInfoBase.java, there is a possible cross-user permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
AI Analysis
Technical Summary
CVE-2026-0021 is a vulnerability identified in the Android operating system, specifically within the hasInteractAcrossUsersFullPermission method of the AppInfoBase.java component. This vulnerability arises from a confused deputy problem, where the permission check incorrectly allows a cross-user permission bypass. In practical terms, this means that a local attacker or malicious application without elevated privileges can exploit this flaw to gain higher privileges on the device without needing additional execution rights or user interaction. The affected Android versions include 14, 15, 16, and 16-qpr2, covering a broad range of recent releases. The vulnerability enables an attacker to perform local privilege escalation, potentially allowing unauthorized access to sensitive data or system functions normally restricted to higher-privileged users. Although no exploits have been observed in the wild yet, the nature of the vulnerability makes it a significant risk, especially in environments where multiple users or apps coexist on a device. The lack of a CVSS score indicates that the vulnerability is newly disclosed, but the technical details and exploitation conditions suggest a high severity level. The flaw is rooted in permission handling logic, a critical security boundary in Android's multi-user and app sandboxing architecture.
Potential Impact
The primary impact of CVE-2026-0021 is local elevation of privilege on affected Android devices. An attacker with local access—such as a malicious app or a user with limited permissions—can exploit this vulnerability to bypass cross-user permission checks and gain unauthorized privileges. This can lead to unauthorized access to sensitive data, modification of system settings, or execution of privileged operations, undermining the confidentiality, integrity, and availability of the device. For organizations, this could mean compromised mobile endpoints, potential data breaches, and disruption of mobile workforce operations. Since exploitation does not require user interaction or additional privileges, the attack surface is broad, increasing the risk of automated or stealthy attacks. The vulnerability is particularly concerning in shared device environments, enterprise mobile deployments, and scenarios where devices are used for sensitive communications or transactions. The absence of known exploits currently limits immediate widespread impact, but the potential for rapid weaponization exists once exploit code becomes available.
Mitigation Recommendations
To mitigate CVE-2026-0021, organizations and users should: 1) Monitor for official security patches from Google and apply them promptly once released for affected Android versions (14 through 16-qpr2). 2) Restrict installation of untrusted or third-party applications, especially those requesting broad permissions or running with local user privileges. 3) Implement mobile device management (MDM) policies that enforce app vetting and limit local user privileges where feasible. 4) Use device encryption and strong authentication to reduce the risk of unauthorized local access. 5) Regularly audit device user accounts and permissions to detect and remove unnecessary or suspicious users. 6) For enterprise environments, consider deploying endpoint detection and response (EDR) solutions capable of monitoring for unusual privilege escalation behaviors. 7) Educate users about the risks of installing apps from unknown sources and the importance of keeping devices updated. These steps go beyond generic advice by focusing on controlling local access vectors and preparing for patch deployment.
Affected Countries
United States, India, China, Germany, United Kingdom, Japan, South Korea, Brazil, France, Canada, Australia, Russia
CVE-2026-0021: Elevation of privilege in Google Android
Description
In hasInteractAcrossUsersFullPermission of AppInfoBase.java, there is a possible cross-user permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2026-0021 is a vulnerability identified in the Android operating system, specifically within the hasInteractAcrossUsersFullPermission method of the AppInfoBase.java component. This vulnerability arises from a confused deputy problem, where the permission check incorrectly allows a cross-user permission bypass. In practical terms, this means that a local attacker or malicious application without elevated privileges can exploit this flaw to gain higher privileges on the device without needing additional execution rights or user interaction. The affected Android versions include 14, 15, 16, and 16-qpr2, covering a broad range of recent releases. The vulnerability enables an attacker to perform local privilege escalation, potentially allowing unauthorized access to sensitive data or system functions normally restricted to higher-privileged users. Although no exploits have been observed in the wild yet, the nature of the vulnerability makes it a significant risk, especially in environments where multiple users or apps coexist on a device. The lack of a CVSS score indicates that the vulnerability is newly disclosed, but the technical details and exploitation conditions suggest a high severity level. The flaw is rooted in permission handling logic, a critical security boundary in Android's multi-user and app sandboxing architecture.
Potential Impact
The primary impact of CVE-2026-0021 is local elevation of privilege on affected Android devices. An attacker with local access—such as a malicious app or a user with limited permissions—can exploit this vulnerability to bypass cross-user permission checks and gain unauthorized privileges. This can lead to unauthorized access to sensitive data, modification of system settings, or execution of privileged operations, undermining the confidentiality, integrity, and availability of the device. For organizations, this could mean compromised mobile endpoints, potential data breaches, and disruption of mobile workforce operations. Since exploitation does not require user interaction or additional privileges, the attack surface is broad, increasing the risk of automated or stealthy attacks. The vulnerability is particularly concerning in shared device environments, enterprise mobile deployments, and scenarios where devices are used for sensitive communications or transactions. The absence of known exploits currently limits immediate widespread impact, but the potential for rapid weaponization exists once exploit code becomes available.
Mitigation Recommendations
To mitigate CVE-2026-0021, organizations and users should: 1) Monitor for official security patches from Google and apply them promptly once released for affected Android versions (14 through 16-qpr2). 2) Restrict installation of untrusted or third-party applications, especially those requesting broad permissions or running with local user privileges. 3) Implement mobile device management (MDM) policies that enforce app vetting and limit local user privileges where feasible. 4) Use device encryption and strong authentication to reduce the risk of unauthorized local access. 5) Regularly audit device user accounts and permissions to detect and remove unnecessary or suspicious users. 6) For enterprise environments, consider deploying endpoint detection and response (EDR) solutions capable of monitoring for unusual privilege escalation behaviors. 7) Educate users about the risks of installing apps from unknown sources and the importance of keeping devices updated. These steps go beyond generic advice by focusing on controlling local access vectors and preparing for patch deployment.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- google_android
- Date Reserved
- 2025-10-15T15:38:56.780Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69a5db80d1a09e29cb1cb9c9
Added to database: 3/2/2026, 6:48:32 PM
Last enriched: 3/2/2026, 7:06:38 PM
Last updated: 3/3/2026, 4:38:16 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20801: CWE-319 Cleartext Transmission of Sensitive Information in Gallagher NxWitness VMS and Hanwha VMS Integrations
MediumCVE-2026-20757: CWE-667 Improper Locking in Gallagher Command Centre Server
LowCVE-2025-47147: CWE-312 Cleartext Storage of Sensitive Information in Gallagher Command Centre Mobile Client
MediumCVE-2026-2628: CWE-288 Authentication Bypass Using an Alternate Path or Channel in cyberlord92 All-in-One Microsoft 365 & Entra ID / Azure AD SSO Login
CriticalCVE-2026-2448: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in gpriday Page Builder by SiteOrigin
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.