CVE-2026-0121: Information disclosure in Google Android
In VPU, there is a possible use-after-free read due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
AI Analysis
Technical Summary
CVE-2026-0121 is a use-after-free vulnerability identified in the Video Processing Unit (VPU) component of the Android kernel. This vulnerability stems from a race condition that causes the kernel to read memory that has already been freed, leading to potential information disclosure. The flaw does not require any elevated privileges or user interaction, meaning an unprivileged local attacker or malicious app could exploit it to access sensitive information residing in kernel memory. The vulnerability is classified under CWE-416 (Use After Free) and CWE-362 (Race Condition), indicating that the root cause is improper memory management combined with concurrency issues. The CVSS v3.1 base score is 2.9, reflecting low severity due to the limited impact scope—only confidentiality is affected, with no impact on integrity or availability. The attack vector is local (AV:L), and the attack complexity is high (AC:H), meaning exploitation is difficult and requires precise timing or conditions. No known exploits have been reported in the wild, and no official patches have been linked yet, though Google has reserved the CVE and published the vulnerability details. This vulnerability affects the Android kernel, which is widely deployed across billions of devices globally, particularly in smartphones and tablets. The lack of required user interaction and privileges makes it a concern for environments where local device access cannot be fully controlled.
Potential Impact
The primary impact of CVE-2026-0121 is local information disclosure, which could allow attackers to read sensitive data from kernel memory. While this does not directly lead to privilege escalation or system compromise, it can aid attackers in gathering intelligence for further attacks or bypassing security mechanisms. Organizations relying on Android devices for sensitive communications, data storage, or secure operations could face confidentiality risks if devices are physically accessible or compromised by malicious apps. The high attack complexity and local access requirement limit the threat to scenarios where attackers have direct or indirect device access. There is no impact on system integrity or availability, so the vulnerability does not cause system crashes or data corruption. However, in high-security environments such as government, defense, or critical infrastructure sectors, even limited information disclosure can have significant consequences. The widespread use of Android devices globally means that many organizations and individuals could potentially be affected if the vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2026-0121, organizations should: 1) Monitor official Google and Android security bulletins for patches addressing this vulnerability and apply them promptly once available. 2) Restrict local access to Android devices, especially in sensitive environments, to prevent unprivileged users or apps from exploiting the race condition. 3) Employ mobile device management (MDM) solutions to enforce strict app installation policies, limiting the installation of untrusted or potentially malicious applications that could exploit local vulnerabilities. 4) Use security features such as SELinux enforcing mode and verified boot to reduce the attack surface and prevent unauthorized code execution. 5) Conduct regular security audits and penetration testing focusing on local privilege escalation and information disclosure vectors. 6) Educate users about the risks of installing untrusted apps and the importance of device physical security. 7) Consider deploying runtime detection tools that can identify anomalous kernel memory access patterns indicative of exploitation attempts. These steps go beyond generic advice by focusing on controlling local access, enforcing strict app policies, and preparing for patch deployment.
Affected Countries
United States, India, China, Brazil, Russia, Germany, United Kingdom, Japan, South Korea, France, Indonesia, Mexico, Nigeria, Turkey, Vietnam
CVE-2026-0121: Information disclosure in Google Android
Description
In VPU, there is a possible use-after-free read due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-0121 is a use-after-free vulnerability identified in the Video Processing Unit (VPU) component of the Android kernel. This vulnerability stems from a race condition that causes the kernel to read memory that has already been freed, leading to potential information disclosure. The flaw does not require any elevated privileges or user interaction, meaning an unprivileged local attacker or malicious app could exploit it to access sensitive information residing in kernel memory. The vulnerability is classified under CWE-416 (Use After Free) and CWE-362 (Race Condition), indicating that the root cause is improper memory management combined with concurrency issues. The CVSS v3.1 base score is 2.9, reflecting low severity due to the limited impact scope—only confidentiality is affected, with no impact on integrity or availability. The attack vector is local (AV:L), and the attack complexity is high (AC:H), meaning exploitation is difficult and requires precise timing or conditions. No known exploits have been reported in the wild, and no official patches have been linked yet, though Google has reserved the CVE and published the vulnerability details. This vulnerability affects the Android kernel, which is widely deployed across billions of devices globally, particularly in smartphones and tablets. The lack of required user interaction and privileges makes it a concern for environments where local device access cannot be fully controlled.
Potential Impact
The primary impact of CVE-2026-0121 is local information disclosure, which could allow attackers to read sensitive data from kernel memory. While this does not directly lead to privilege escalation or system compromise, it can aid attackers in gathering intelligence for further attacks or bypassing security mechanisms. Organizations relying on Android devices for sensitive communications, data storage, or secure operations could face confidentiality risks if devices are physically accessible or compromised by malicious apps. The high attack complexity and local access requirement limit the threat to scenarios where attackers have direct or indirect device access. There is no impact on system integrity or availability, so the vulnerability does not cause system crashes or data corruption. However, in high-security environments such as government, defense, or critical infrastructure sectors, even limited information disclosure can have significant consequences. The widespread use of Android devices globally means that many organizations and individuals could potentially be affected if the vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2026-0121, organizations should: 1) Monitor official Google and Android security bulletins for patches addressing this vulnerability and apply them promptly once available. 2) Restrict local access to Android devices, especially in sensitive environments, to prevent unprivileged users or apps from exploiting the race condition. 3) Employ mobile device management (MDM) solutions to enforce strict app installation policies, limiting the installation of untrusted or potentially malicious applications that could exploit local vulnerabilities. 4) Use security features such as SELinux enforcing mode and verified boot to reduce the attack surface and prevent unauthorized code execution. 5) Conduct regular security audits and penetration testing focusing on local privilege escalation and information disclosure vectors. 6) Educate users about the risks of installing untrusted apps and the importance of device physical security. 7) Consider deploying runtime detection tools that can identify anomalous kernel memory access patterns indicative of exploitation attempts. These steps go beyond generic advice by focusing on controlling local access, enforcing strict app policies, and preparing for patch deployment.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Google_Devices
- Date Reserved
- 2025-10-23T08:43:19.699Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69b0864a2f860ef943bb9903
Added to database: 3/10/2026, 8:59:54 PM
Last enriched: 3/18/2026, 6:30:22 PM
Last updated: 4/28/2026, 5:10:52 AM
Views: 102
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.