Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0121: Information disclosure in Google Android

0
Low
VulnerabilityCVE-2026-0121cvecve-2026-0121
Published: Tue Mar 10 2026 (03/10/2026, 20:46:50 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In VPU, there is a possible use-after-free read due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

AILast updated: 03/10/2026, 21:16:59 UTC

Technical Analysis

CVE-2026-0121 is a vulnerability identified in the Video Processing Unit (VPU) of the Android kernel. The flaw is a use-after-free condition caused by a race condition, where the system accesses memory after it has been freed, leading to undefined behavior. This vulnerability allows an attacker with local access to the device to read sensitive information from kernel memory without requiring elevated privileges or any user interaction. The race condition implies that the timing of operations can be manipulated to trigger the use-after-free scenario. Since the vulnerability resides in the kernel, which is a critical component of the Android operating system, exploitation could expose confidential data residing in memory, potentially including cryptographic keys, personal information, or other sensitive data. The vulnerability affects the Android kernel broadly, meaning many devices running various Android versions could be impacted. No public exploits have been reported yet, but the nature of the flaw means it could be leveraged by malicious local applications or attackers who have gained limited access to the device. The absence of a CVSS score indicates that the vulnerability is newly disclosed and not yet fully assessed, but the technical details suggest significant risk due to the kernel-level impact and lack of required privileges or user interaction.

Potential Impact

The primary impact of CVE-2026-0121 is local information disclosure, which can compromise the confidentiality of sensitive data stored or processed on affected Android devices. Since the vulnerability is in the kernel, leaked information could include critical system data, user credentials, or cryptographic material, which could facilitate further attacks such as privilege escalation or persistent compromise. The lack of required privileges or user interaction lowers the barrier for exploitation, increasing the risk from malicious local apps or attackers with limited access. Organizations relying on Android devices for sensitive communications, mobile workforce operations, or secure applications could face data leakage risks. The vulnerability does not directly affect system integrity or availability but could be a stepping stone for more severe attacks. The widespread use of Android globally means a large number of devices could be vulnerable, potentially impacting enterprises, government agencies, and individual users. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat as attackers may develop exploits once patches are available or if the vulnerability is reverse-engineered.

Mitigation Recommendations

To mitigate CVE-2026-0121, organizations and users should apply security patches from Google or device manufacturers as soon as they become available, as kernel-level vulnerabilities require vendor-supplied fixes. Until patches are released, limiting local access to devices is critical; this includes enforcing strong device lock mechanisms, restricting installation of untrusted applications, and using mobile device management (MDM) solutions to control app permissions and device configurations. Employing runtime protections such as SELinux enforcing mode and kernel hardening features can reduce exploitation likelihood. Monitoring devices for unusual local activity and suspicious applications can help detect attempts to exploit the vulnerability. Developers should review applications that interact with the VPU or kernel components to ensure they do not inadvertently trigger race conditions. Finally, educating users about the risks of installing untrusted apps and maintaining updated devices is essential to reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Google_Devices
Date Reserved
2025-10-23T08:43:19.699Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b0864a2f860ef943bb9903

Added to database: 3/10/2026, 8:59:54 PM

Last enriched: 3/10/2026, 9:16:59 PM

Last updated: 3/13/2026, 4:01:24 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses