Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0021: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2026-0021cvecve-2026-0021
Published: Mon Mar 02 2026 (03/02/2026, 18:42:43 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In hasInteractAcrossUsersFullPermission of AppInfoBase.java, there is a possible cross-user permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 03/02/2026, 19:06:38 UTC

Technical Analysis

CVE-2026-0021 is a vulnerability identified in the Android operating system, specifically within the hasInteractAcrossUsersFullPermission method of the AppInfoBase.java component. This vulnerability arises from a confused deputy problem, where the permission check incorrectly allows a cross-user permission bypass. In practical terms, this means that a local attacker or malicious application without elevated privileges can exploit this flaw to gain higher privileges on the device without needing additional execution rights or user interaction. The affected Android versions include 14, 15, 16, and 16-qpr2, covering a broad range of recent releases. The vulnerability enables an attacker to perform local privilege escalation, potentially allowing unauthorized access to sensitive data or system functions normally restricted to higher-privileged users. Although no exploits have been observed in the wild yet, the nature of the vulnerability makes it a significant risk, especially in environments where multiple users or apps coexist on a device. The lack of a CVSS score indicates that the vulnerability is newly disclosed, but the technical details and exploitation conditions suggest a high severity level. The flaw is rooted in permission handling logic, a critical security boundary in Android's multi-user and app sandboxing architecture.

Potential Impact

The primary impact of CVE-2026-0021 is local elevation of privilege on affected Android devices. An attacker with local access—such as a malicious app or a user with limited permissions—can exploit this vulnerability to bypass cross-user permission checks and gain unauthorized privileges. This can lead to unauthorized access to sensitive data, modification of system settings, or execution of privileged operations, undermining the confidentiality, integrity, and availability of the device. For organizations, this could mean compromised mobile endpoints, potential data breaches, and disruption of mobile workforce operations. Since exploitation does not require user interaction or additional privileges, the attack surface is broad, increasing the risk of automated or stealthy attacks. The vulnerability is particularly concerning in shared device environments, enterprise mobile deployments, and scenarios where devices are used for sensitive communications or transactions. The absence of known exploits currently limits immediate widespread impact, but the potential for rapid weaponization exists once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2026-0021, organizations and users should: 1) Monitor for official security patches from Google and apply them promptly once released for affected Android versions (14 through 16-qpr2). 2) Restrict installation of untrusted or third-party applications, especially those requesting broad permissions or running with local user privileges. 3) Implement mobile device management (MDM) policies that enforce app vetting and limit local user privileges where feasible. 4) Use device encryption and strong authentication to reduce the risk of unauthorized local access. 5) Regularly audit device user accounts and permissions to detect and remove unnecessary or suspicious users. 6) For enterprise environments, consider deploying endpoint detection and response (EDR) solutions capable of monitoring for unusual privilege escalation behaviors. 7) Educate users about the risks of installing apps from unknown sources and the importance of keeping devices updated. These steps go beyond generic advice by focusing on controlling local access vectors and preparing for patch deployment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-10-15T15:38:56.780Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a5db80d1a09e29cb1cb9c9

Added to database: 3/2/2026, 6:48:32 PM

Last enriched: 3/2/2026, 7:06:38 PM

Last updated: 3/3/2026, 4:38:16 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses