Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0112: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2026-0112cvecve-2026-0112
Published: Tue Mar 10 2026 (03/10/2026, 20:46:41 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In vpu_open_inst of vpu_ioctl.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 03/10/2026, 21:19:01 UTC

Technical Analysis

CVE-2026-0112 is a vulnerability identified in the Android kernel, specifically within the vpu_open_inst function in the vpu_ioctl.c source file. The issue is a use-after-free condition caused by a race condition, where a kernel object is freed while still being accessed, leading to undefined behavior. This flaw allows a local attacker to escalate privileges without needing additional execution rights or user interaction, meaning that if an attacker already has some form of local access (e.g., through a compromised app or physical access), they can exploit this vulnerability to gain higher privileges on the device. The Android kernel is a critical component managing hardware and system resources, so a compromise here can lead to full system control. The vulnerability was reserved in October 2025 and published in March 2026, but no CVSS score has been assigned yet, and no public exploits have been reported. The race condition nature implies exploitation requires precise timing, but once exploited, it can bypass security boundaries, potentially allowing attackers to install persistent malware, access sensitive data, or disrupt device operations. This vulnerability affects all Android devices running the vulnerable kernel versions until patched.

Potential Impact

The impact of CVE-2026-0112 is significant for organizations and individuals using Android devices. A successful local privilege escalation can allow attackers to gain root or system-level access, bypassing Android's security model. This can lead to unauthorized access to sensitive data, installation of persistent malware, and potential disruption of device functionality. For enterprises, compromised devices can serve as entry points into corporate networks, especially in Bring Your Own Device (BYOD) environments. The lack of requirement for user interaction increases the risk, as exploitation can occur silently once local access is obtained. Although no remote exploitation is indicated, the widespread use of Android globally means that attackers targeting specific users or organizations could leverage this vulnerability to escalate privileges after initial compromise. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2026-0112, organizations and users should apply security patches provided by device manufacturers or Google as soon as they become available. Given the kernel-level nature of the vulnerability, updating the Android OS to the latest secure version is critical. Until patches are applied, minimizing local access to devices is essential; this includes enforcing strong device authentication, restricting installation of untrusted applications, and using mobile device management (MDM) solutions to control device configurations. Monitoring for unusual privilege escalations or kernel-level anomalies can help detect exploitation attempts. Developers should review and harden kernel code to prevent race conditions and use-after-free bugs, employing techniques such as proper locking mechanisms and memory management. Additionally, organizations should educate users about the risks of installing apps from untrusted sources and maintain robust endpoint security controls on mobile devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Google_Devices
Date Reserved
2025-10-23T08:43:06.676Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b086492f860ef943bb98d1

Added to database: 3/10/2026, 8:59:53 PM

Last enriched: 3/10/2026, 9:19:01 PM

Last updated: 3/13/2026, 9:00:35 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses