Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0115: Information disclosure in Google Android

0
Low
VulnerabilityCVE-2026-0115cvecve-2026-0115
Published: Tue Mar 10 2026 (03/10/2026, 20:46:44 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In Trusted Execution Environment, there is a possible key leak due to side channel information disclosure. This could lead to physical information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.

AI-Powered Analysis

AILast updated: 03/10/2026, 21:18:23 UTC

Technical Analysis

CVE-2026-0115 is a vulnerability identified in the Trusted Execution Environment (TEE) component of the Android kernel. The TEE is a secure area of the main processor that ensures sensitive data and operations are isolated from the main operating system, providing a higher level of security for cryptographic keys and other confidential information. This vulnerability arises from a side-channel information disclosure, where an attacker can infer secret information by analyzing indirect data such as timing, power consumption, or electromagnetic leaks, rather than exploiting a direct software flaw. The key leak could allow attackers to extract cryptographic keys or other sensitive data stored in the TEE without needing elevated privileges or kernel-level access. However, exploitation requires user interaction, meaning the attacker must trick the user into performing an action that triggers the leak, such as opening a malicious app or interacting with a crafted message. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability affects the Android kernel, which is present on billions of devices worldwide, making the potential attack surface very large. The lack of a patch link suggests that fixes may still be in development or pending deployment by device manufacturers and Google. The side-channel nature of the attack makes detection and prevention challenging, as it does not rely on traditional code execution vulnerabilities but on subtle hardware or microarchitectural behaviors.

Potential Impact

The primary impact of CVE-2026-0115 is the compromise of confidentiality within the Trusted Execution Environment on Android devices. If exploited, attackers could obtain cryptographic keys or sensitive data, potentially undermining the security of encrypted communications, authentication tokens, or digital rights management (DRM) protections. This could lead to unauthorized data access, identity theft, or bypassing security controls that rely on TEE protections. Since the TEE is designed to protect highly sensitive operations, the leakage of keys could have cascading effects on device security and user privacy. The requirement for user interaction limits the ease of exploitation but does not eliminate risk, especially in environments where users may be targeted with phishing or social engineering attacks. The vulnerability does not affect system availability or integrity directly but could facilitate further attacks if keys are compromised. Organizations relying on Android devices for secure communications, mobile payments, or confidential data processing are particularly at risk. The widespread use of Android globally means the potential impact is extensive, affecting both consumers and enterprises.

Mitigation Recommendations

To mitigate CVE-2026-0115, organizations and users should prioritize installing security updates and patches provided by Google and device manufacturers as soon as they become available. Since the vulnerability resides in the Android kernel's TEE implementation, firmware and OS updates are critical. Until patches are deployed, users should exercise caution with unsolicited messages, links, or applications that require interaction, as these could be vectors for triggering the side-channel leak. Enterprises should implement mobile device management (MDM) policies to control app installations and enforce security configurations. Developers and security teams should monitor official advisories from Google and Android security bulletins for updates and guidance. Additionally, employing behavioral detection tools that monitor unusual app or system behavior may help identify exploitation attempts. For high-security environments, consider restricting the use of vulnerable devices or isolating sensitive operations to hardware or software platforms not affected by this vulnerability. Finally, educating users about social engineering risks and safe mobile practices can reduce the likelihood of successful exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Google_Devices
Date Reserved
2025-10-23T08:43:11.363Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b086492f860ef943bb98da

Added to database: 3/10/2026, 8:59:53 PM

Last enriched: 3/10/2026, 9:18:23 PM

Last updated: 3/14/2026, 3:07:55 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses