Cyber Posture

CVE-2026-0020

High

Published: 02 March 2026

Published
02 March 2026
Modified
06 March 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0000 0.1th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-0020 is a high-severity Authorization Bypass Through User-Controlled Key (CWE-639) vulnerability in Google Android. Its CVSS base score is 8.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 requires enforcement of approved authorizations for access, directly mitigating the consent dialog bypass in parsePermissionGroup of ParsedPermissionUtils.java.

prevent

SI-2 mandates identification, reporting, and correction of flaws like CVE-2026-0020, enabling application of patches from the Android security bulletin.

prevent

SI-10 enforces validation of information inputs to the parsePermissionGroup function, preventing authorization bypass through user-controlled keys as described in CWE-639.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Direct local privilege escalation via permissions/consent bypass in Android permission parsing logic.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In parsePermissionGroup of ParsedPermissionUtils.java, there is a possible way to bypass a consent dialog to obtain permissions due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not…

more

needed for exploitation.

Deeper analysisAI

CVE-2026-0020 is a permissions bypass vulnerability located in the parsePermissionGroup function of ParsedPermissionUtils.java within the Android platform. The flaw enables attackers to circumvent a consent dialog and obtain permissions without additional execution privileges required. Published on 2026-03-02, it is rated with a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-639 (Authorization Bypass Through User-Controlled Key).

A local attacker can exploit this vulnerability due to its low attack complexity and lack of need for user interaction. With no prior privileges (PR:N), the attacker achieves local escalation of privilege, granting high-impact access to confidentiality, integrity, and availability (C:H/I:H/A:H).

The Android security bulletin at https://source.android.com/docs/security/bulletin/2026/2026-03-01 provides details on affected versions and available patches for mitigation.

Details

CWE(s)

Affected Products

google
android
14.0, 15.0, 16.0

CVEs Like This One

CVE-2025-48574Same product: Google Android
CVE-2025-36920Same product: Google Android
CVE-2026-0011Same product: Google Android
CVE-2026-0117Same product: Google Android
CVE-2024-53833Same product: Google Android
CVE-2026-0010Same product: Google Android
CVE-2026-0037Same product: Google Android
CVE-2025-48577Same product: Google Android
CVE-2024-49742Same product: Google Android
CVE-2025-48635Same product: Google Android

References