Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0119: Elevation of privilege in Google Android

0
Medium
VulnerabilityCVE-2026-0119cvecve-2026-0119
Published: Tue Mar 10 2026 (03/10/2026, 20:46:48 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In usim_SendMCCMNCIndMsg of usim_Registration.c, there is a possible out of bounds write due to memory corruption. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 03/10/2026, 21:17:27 UTC

Technical Analysis

CVE-2026-0119 is a kernel-level vulnerability in Google Android affecting the usim_SendMCCMNCIndMsg function within the usim_Registration.c source code. The flaw is an out-of-bounds write caused by improper memory handling during the processing of MCC (Mobile Country Code) and MNC (Mobile Network Code) indication messages. This memory corruption can be exploited to perform a physical elevation of privilege on the device, meaning an attacker can gain higher privileges without needing additional code execution capabilities or user interaction. The vulnerability is rooted in the Android kernel, a critical component responsible for managing hardware and system resources. Since the kernel operates at the highest privilege level, exploitation could allow attackers to bypass security controls, access sensitive data, or install persistent malware. The vulnerability was reserved in late 2025 and published in early 2026, but no public exploits have been reported yet. The lack of a CVSS score suggests the need for an independent severity assessment. The vulnerability affects all devices running the vulnerable Android kernel versions, which includes a vast number of smartphones and tablets worldwide. The attack vector does not require authentication or user interaction, increasing the risk of automated or remote exploitation in certain scenarios. The flaw's exploitation could be leveraged by malicious actors to compromise device integrity, confidentiality, and availability.

Potential Impact

The impact of CVE-2026-0119 is significant due to its kernel-level nature and the ability to escalate privileges without user interaction. Successful exploitation can allow attackers to gain root or system-level access on affected Android devices, bypassing security restrictions and potentially installing persistent malware or spyware. This compromises device confidentiality, integrity, and availability. Organizations relying on Android devices for sensitive communications, mobile workforce, or IoT deployments could face data breaches, espionage, or operational disruptions. The vulnerability could also be used to facilitate further attacks, such as lateral movement within networks or deployment of ransomware. Given the widespread use of Android globally, the scale of potential impact is large. Although no known exploits are currently in the wild, the ease of exploitation and lack of required user interaction make this a high-risk vulnerability that could be weaponized quickly once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2026-0119, organizations and users should prioritize applying official security patches from Google and device manufacturers as soon as they become available. Since this vulnerability resides in the Android kernel, updating the device firmware or operating system to the latest secure version is critical. For enterprises managing fleets of Android devices, implementing mobile device management (MDM) solutions can help enforce timely patch deployment and monitor device integrity. Additionally, restricting physical access to devices and employing endpoint detection and response (EDR) tools capable of monitoring kernel-level anomalies can reduce exploitation risk. Network-level protections, such as segmentation and monitoring for unusual device behavior, can also help detect exploitation attempts. Developers and security teams should audit related kernel modules handling mobile network registration messages for similar memory safety issues to prevent future vulnerabilities. Finally, educating users about the importance of installing updates promptly and avoiding untrusted sources for device software is essential.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Google_Devices
Date Reserved
2025-10-23T08:43:17.011Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b0864a2f860ef943bb98fd

Added to database: 3/10/2026, 8:59:54 PM

Last enriched: 3/10/2026, 9:17:27 PM

Last updated: 3/12/2026, 11:52:41 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses