Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-0038
Analyzed
More InfoOfficial Page
Source-security@android.com
View Known Exploited Vulnerability (KEV) details
Published At-02 Mar, 2026 | 19:16
Updated At-03 Mar, 2026 | 15:31

In multiple functions of mem_protect.c, there is a possible way to execute arbitrary code due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.4HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.4
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Google LLC
google
>>android>>-
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://android.googlesource.com/kernel/common/+/1bf8033b56a45165602f8116e0a0d2e767f1e8aesecurity@android.com
Patch
Product
https://android.googlesource.com/kernel/common/+/513ea99ae008b81dd266bf6e361627c058ddde41security@android.com
Patch
Product
https://android.googlesource.com/kernel/common/+/652b7b6bf9a62cc12c3a071bab4e92314f046739security@android.com
Patch
Product
https://android.googlesource.com/kernel/common/+/7e1d15d29b7fe0f858926a8bcaf929b75db9e52asecurity@android.com
Patch
Product
https://android.googlesource.com/kernel/common/+/b23a5bfa1fb8f9525e21f095a87486a2bd856321security@android.com
Patch
Product
https://android.googlesource.com/kernel/common/+/d884f499434c224285c30d460681f1ce76a8cf1fsecurity@android.com
Patch
Product
https://android.googlesource.com/kernel/common/+/f090d4b083a9ef4831f99e692c239542dd385cb4security@android.com
Patch
Product
https://source.android.com/security/bulletin/2026-03-01security@android.com
Broken Link
Hyperlink: https://android.googlesource.com/kernel/common/+/1bf8033b56a45165602f8116e0a0d2e767f1e8ae
Source: security@android.com
Resource:
Patch
Product
Hyperlink: https://android.googlesource.com/kernel/common/+/513ea99ae008b81dd266bf6e361627c058ddde41
Source: security@android.com
Resource:
Patch
Product
Hyperlink: https://android.googlesource.com/kernel/common/+/652b7b6bf9a62cc12c3a071bab4e92314f046739
Source: security@android.com
Resource:
Patch
Product
Hyperlink: https://android.googlesource.com/kernel/common/+/7e1d15d29b7fe0f858926a8bcaf929b75db9e52a
Source: security@android.com
Resource:
Patch
Product
Hyperlink: https://android.googlesource.com/kernel/common/+/b23a5bfa1fb8f9525e21f095a87486a2bd856321
Source: security@android.com
Resource:
Patch
Product
Hyperlink: https://android.googlesource.com/kernel/common/+/d884f499434c224285c30d460681f1ce76a8cf1f
Source: security@android.com
Resource:
Patch
Product
Hyperlink: https://android.googlesource.com/kernel/common/+/f090d4b083a9ef4831f99e692c239542dd385cb4
Source: security@android.com
Resource:
Patch
Product
Hyperlink: https://source.android.com/security/bulletin/2026-03-01
Source: security@android.com
Resource:
Broken Link
Change History
0Changes found

Details not found