Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0109: Denial of service in Google Android

0
High
VulnerabilityCVE-2026-0109cvecve-2026-0109
Published: Tue Mar 10 2026 (03/10/2026, 20:46:38 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In dhd_tcpdata_info_get of dhd_ip.c, there is a possible Denial of Service due to a precondition check failure. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 03/10/2026, 21:19:47 UTC

Technical Analysis

CVE-2026-0109 is a vulnerability identified in the Android kernel, specifically within the function dhd_tcpdata_info_get located in the dhd_ip.c source file. The issue stems from a failure in a precondition check, which can be exploited remotely to cause a denial of service (DoS) condition. This means an attacker can send specially crafted network packets to the affected device, triggering the kernel function to fail and crash or become unresponsive, thereby disrupting normal device operation. The vulnerability does not require any user interaction or elevated privileges, making it easier to exploit remotely. The affected component is part of the kernel's handling of TCP data, which is fundamental to network communication on Android devices. Although no exploits have been reported in the wild yet, the nature of the vulnerability suggests that attackers could leverage it to disrupt services on a wide range of Android devices. The lack of a CVSS score indicates that the vulnerability is newly disclosed and pending further assessment. Given that the kernel is a critical component, any instability or crash can lead to device reboots, loss of connectivity, or complete denial of service, impacting both end users and enterprise environments relying on Android devices.

Potential Impact

The primary impact of CVE-2026-0109 is denial of service at the kernel level on Android devices. This can cause devices to crash, reboot, or become unresponsive, disrupting user access and device functionality. For organizations, this could lead to interruptions in mobile workforce productivity, loss of communication capabilities, and potential cascading effects on services relying on Android devices. The vulnerability does not allow privilege escalation or data compromise directly but can be used to degrade service availability significantly. Since exploitation requires no user interaction and no additional privileges, attackers can remotely target vulnerable devices en masse, potentially leading to large-scale disruptions. Critical infrastructure relying on Android devices, such as mobile payment systems, communication networks, and IoT deployments, could be particularly affected. The lack of known exploits currently limits immediate risk, but the ease of exploitation and kernel-level impact make this a high-risk vulnerability once weaponized.

Mitigation Recommendations

To mitigate CVE-2026-0109, organizations and users should prioritize applying official patches from Google or device manufacturers as soon as they become available. Until patches are released, network-level controls such as firewalls and intrusion prevention systems should be configured to monitor and block suspicious or malformed TCP traffic targeting vulnerable devices. Employing network segmentation can limit exposure of critical Android devices to untrusted networks. Device management solutions should enforce strict update policies and monitor device health for signs of instability or crashes. Security teams should also review logs for unusual network activity that could indicate exploitation attempts. For enterprises, deploying endpoint detection and response (EDR) tools capable of identifying kernel-level anomalies can provide early warning. Collaboration with mobile carriers to detect and mitigate attack traffic at the network edge can further reduce risk. Finally, educating users and administrators about the vulnerability and encouraging prompt updates will help minimize the attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Google_Devices
Date Reserved
2025-10-23T08:43:01.281Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b086492f860ef943bb98c8

Added to database: 3/10/2026, 8:59:53 PM

Last enriched: 3/10/2026, 9:19:47 PM

Last updated: 3/13/2026, 7:17:04 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses