Cyber Posture

CVE-2026-0017

High

Published: 02 March 2026

Published
02 March 2026
Modified
06 March 2026
KEV Added
Patch
CVSS Score 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0000 0.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-0017 is a high-severity Improper Authorization (CWE-285) vulnerability in Google Android. Its CVSS base score is 7.7 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

The logic error in BiometricService.java represents a failure to enforce approved authorizations, allowing unauthorized enabling of fingerprint unlock and local privilege escalation.

prevent

Requires identification, reporting, and correction of the specific flaw in BiometricService.java to prevent exploitation of the improper authorization vulnerability.

prevent

Enforcing least privilege restricts unprivileged local attackers from enabling fingerprint unlock, mitigating the escalation pathway despite the logic error.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Direct local privilege escalation via exploitation of a biometric logic flaw with no user interaction required.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In onChange of BiometricService.java, there is a possible way to enable fingerprint unlock due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed…

more

for exploitation.

Deeper analysisAI

CVE-2026-0017 is a logic error in the onChange method of BiometricService.java within the Android operating system. This flaw enables an attacker to activate fingerprint unlock functionality, resulting in a local escalation of privilege. No additional execution privileges are required for exploitation, and user interaction is unnecessary. The vulnerability is rated 7.7 on the CVSS v3.1 scale (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) and is associated with CWE-285 (Improper Authorization) and CWE-693 (Protection Mechanism Failure).

A local attacker can exploit this vulnerability with low complexity and no privileges, as indicated by the CVSS vector. Successful exploitation allows the attacker to gain elevated privileges, compromising high levels of confidentiality and integrity without affecting availability.

The Android security bulletin at https://source.android.com/docs/security/bulletin/2026/2026-03-01, published on 2026-03-01, provides details on available patches and mitigation guidance for addressing this issue.

Details

CWE(s)

Affected Products

google
android
16.0

CVEs Like This One

CVE-2026-0118Same product: Google Android
CVE-2025-48602Same product: Google Android
CVE-2025-48605Same product: Google Android
CVE-2025-48653Same product: Google Android
CVE-2026-0011Same product: Google Android
CVE-2025-48635Same product: Google Android
CVE-2025-48574Same product: Google Android
CVE-2025-36920Same product: Google Android
CVE-2026-0020Same product: Google Android
CVE-2026-0117Same product: Google Android

References