Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0035: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2026-0035cvecve-2026-0035
Published: Mon Mar 02 2026 (03/02/2026, 18:42:57 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

CVE-2026-0035 is a local elevation of privilege vulnerability in Google Android affecting versions 14 through 16 and 16-qpr2. The flaw exists in the createRequest function of MediaProvider. java, where a logic error allows an app to gain unauthorized read/write access to non-existing files. Exploitation does not require additional execution privileges or user interaction, making it easier for malicious apps to escalate privileges locally. No known exploits are currently reported in the wild. This vulnerability could enable attackers to bypass Android's security model and access or modify sensitive data. Organizations relying on affected Android versions should prioritize patching once updates are available. The severity is assessed as high due to the ease of exploitation and potential impact on confidentiality and integrity. Countries with large Android user bases and significant mobile ecosystems are most at risk. Immediate mitigation involves restricting app permissions and monitoring for suspicious local activity until patches are deployed.

AI-Powered Analysis

AILast updated: 03/02/2026, 19:03:23 UTC

Technical Analysis

CVE-2026-0035 is a vulnerability identified in the Android operating system, specifically within the MediaProvider component's createRequest method. The issue arises from a logic error that improperly handles file access requests, allowing an application to gain read and write access to files that do not exist. This flaw effectively bypasses normal access controls, enabling local privilege escalation without requiring the app to have any additional execution privileges or user interaction. The vulnerability affects Android versions 14, 15, 16, and 16-qpr2, which cover a broad range of devices currently in use. Although no exploits have been observed in the wild, the vulnerability's nature suggests that a malicious app installed on a device could leverage this flaw to escalate its privileges and potentially access or modify sensitive data or system files. The absence of a CVSS score indicates that the vulnerability is newly published, but the technical details imply a significant security risk. The flaw's exploitation does not require complex conditions, making it a critical concern for device security. The vulnerability highlights the importance of secure coding practices in system-level components like MediaProvider, which manage media file access and are integral to Android's security architecture.

Potential Impact

The impact of CVE-2026-0035 is substantial for organizations and individuals relying on affected Android versions. Successful exploitation allows a malicious app to escalate privileges locally, potentially bypassing sandbox restrictions and accessing or modifying sensitive files. This can lead to data breaches, unauthorized data manipulation, or persistence mechanisms that compromise device integrity. For enterprises, compromised devices could serve as entry points for lateral movement within corporate networks or data exfiltration. The lack of required user interaction lowers the barrier for exploitation, increasing the risk of widespread abuse. Although no remote exploitation is indicated, the local nature still poses a serious threat given the prevalence of Android devices globally. The vulnerability could undermine trust in device security, especially in sectors handling sensitive information such as finance, healthcare, and government. Until patches are applied, the risk of privilege escalation attacks remains significant, potentially affecting device availability and confidentiality.

Mitigation Recommendations

To mitigate CVE-2026-0035, organizations and users should take immediate steps beyond waiting for official patches. First, restrict app installations to trusted sources such as the Google Play Store and enforce strict app permission policies to limit unnecessary access to media and file system components. Employ mobile device management (MDM) solutions to monitor and control app behavior, detecting anomalous file access patterns indicative of exploitation attempts. Disable or limit the use of apps that request broad file system access, especially those not essential for business operations. Encourage users to avoid installing unknown or untrusted applications and educate them about the risks of privilege escalation vulnerabilities. Once Google releases patches, prioritize rapid deployment across all affected devices. Additionally, consider implementing runtime application self-protection (RASP) or endpoint detection and response (EDR) tools capable of identifying suspicious local privilege escalation activities. Regularly audit device security configurations and maintain up-to-date backups to recover from potential compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
google_android
Date Reserved
2025-10-15T15:39:20.653Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a5db84d1a09e29cb1cf10f

Added to database: 3/2/2026, 6:48:36 PM

Last enriched: 3/2/2026, 7:03:23 PM

Last updated: 3/2/2026, 7:53:09 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses