Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0117: Elevation of privilege in Google Android

0
High
VulnerabilityCVE-2026-0117cvecve-2026-0117
Published: Tue Mar 10 2026 (03/10/2026, 20:46:46 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In mfc_dec_dqbuf of mfc_dec_v4l2.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 03/10/2026, 21:17:55 UTC

Technical Analysis

CVE-2026-0117 is a vulnerability identified in the Android kernel's media framework, specifically in the mfc_dec_dqbuf function within the mfc_dec_v4l2.c source file. The vulnerability is caused by an incorrect bounds check that can result in an out-of-bounds write operation. This type of memory corruption flaw can be leveraged by a local attacker to escalate privileges on the device without requiring any additional execution privileges or user interaction. The flaw resides in the kernel-level media decoder component, which processes multimedia data streams. Because the kernel operates with high privileges, successful exploitation could allow an attacker to execute arbitrary code or manipulate kernel memory, thereby gaining elevated privileges. The vulnerability affects the Android kernel broadly, impacting many devices running affected versions. Although no public exploits have been reported to date, the nature of the flaw and its location in the kernel make it a significant security concern. The vulnerability was reserved in October 2025 and published in March 2026, but no CVSS score has been assigned yet. The absence of a patch link suggests that a fix may still be pending or in deployment. The vulnerability does not require user interaction, increasing the risk of exploitation by malicious local applications or users. This flaw highlights the importance of secure bounds checking in kernel code, especially in components handling complex data such as multimedia streams.

Potential Impact

The primary impact of CVE-2026-0117 is local privilege escalation on affected Android devices. An attacker with local access could exploit the out-of-bounds write to gain elevated privileges, potentially leading to full control over the device. This could compromise device confidentiality, integrity, and availability by allowing installation of persistent malware, bypassing security controls, or disrupting normal device operation. Since the vulnerability exists in the kernel, the impact is severe because kernel-level compromise undermines all security mechanisms on the device. Organizations relying on Android devices for sensitive communications or operations could face data breaches, unauthorized access, or service disruptions. The lack of required user interaction lowers the barrier for exploitation, increasing risk especially in environments where untrusted users or applications have local access. While no exploits are currently known in the wild, the vulnerability’s characteristics make it a high-risk target for attackers once exploit code becomes available. This could affect enterprises, government agencies, and consumers globally, especially those using devices with unpatched Android kernels.

Mitigation Recommendations

To mitigate CVE-2026-0117, organizations and users should prioritize applying security updates and patches from Google or device manufacturers as soon as they become available. Since this vulnerability resides in the kernel, updating the Android OS to the latest secure version is critical. Until patches are deployed, restricting local access to devices is essential; this includes enforcing strong device access controls, disabling unnecessary local accounts, and limiting installation of untrusted applications. Employing mobile device management (MDM) solutions can help enforce security policies and monitor for suspicious local activity. Additionally, organizations should audit devices for signs of compromise and educate users about the risks of installing untrusted software. Developers should review kernel code for similar bounds checking issues to prevent future vulnerabilities. Finally, monitoring vulnerability disclosures and threat intelligence feeds will help organizations respond promptly if exploitation attempts emerge.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Google_Devices
Date Reserved
2025-10-23T08:43:14.088Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b0864a2f860ef943bb98f7

Added to database: 3/10/2026, 8:59:54 PM

Last enriched: 3/10/2026, 9:17:55 PM

Last updated: 3/13/2026, 7:53:12 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses