Cyber Posture

CVE-2026-0113

Critical

Published: 10 March 2026

Published
10 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0024 46.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-0113 is a critical-severity Out-of-bounds Write (CWE-787) vulnerability in Google Android. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 46.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of information inputs including bounds checks, directly preventing the out-of-bounds write due to incorrect bounds check in ns_GetUserData.

prevent

SI-16 enforces memory protections such as address space layout randomization and stack guards that mitigate exploitation of out-of-bounds writes for privilege escalation.

prevent

SI-2 mandates timely identification, testing, and remediation of flaws like this buffer overflow vulnerability via patching as detailed in Android security bulletins.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Remote network exploitation with no privileges enables T1190 (Exploit Public-Facing Application); results in privilege escalation matching T1068 (Exploitation for Privilege Escalation).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

In ns_GetUserData of ns_SmscbUtilities.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Deeper analysisAI

CVE-2026-0113 is a vulnerability involving an out-of-bounds write due to an incorrect bounds check in the ns_GetUserData function of ns_SmscbUtilities.c. This issue affects Android devices, as documented in the associated security bulletins.

A remote attacker requires no privileges or user interaction to exploit this vulnerability over the network with low attack complexity. Successful exploitation leads to escalation of privilege, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflecting high impacts on confidentiality, integrity, and availability. The root cause is classified under CWE-787 (Out-of-bounds Write).

The Android Security Bulletin for 2026-03-01 at https://source.android.com/docs/security/bulletin/2026/2026-03-01 and the Pixel-specific bulletin at https://source.android.com/docs/security/bulletin/pixel/2026/2026-03-01 provide details on patches and mitigation steps.

Details

CWE(s)

Affected Products

google
android
all versions

CVEs Like This One

CVE-2024-43768Same product: Google Android
CVE-2026-0123Same product: Google Android
CVE-2026-0010Same product: Google Android
CVE-2024-43097Same product: Google Android
CVE-2026-0030Same product: Google Android
CVE-2024-53833Same product: Google Android
CVE-2026-0117Same product: Google Android
CVE-2026-0116Same product: Google Android
CVE-2025-32313Same product: Google Android
CVE-2024-53838Same product: Google Android

References