Cyber Posture

CVE-2026-0114

Critical

Published: 10 March 2026

Published
10 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0024 46.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-0114 is a critical-severity Out-of-bounds Write (CWE-787) vulnerability in Google Android. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 46.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the CVE by requiring timely identification, reporting, and remediation of the out-of-bounds write flaw in the Android Modem component.

prevent

Mandates validation of information inputs to the Modem, preventing the out-of-bounds write caused by the incorrect bounds check on network data.

prevent

Implements memory safeguards such as non-executable regions and randomization to mitigate remote code execution from the Modem's out-of-bounds write vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2026-0114 enables unauthenticated remote code execution by exploiting an out-of-bounds write in the public-facing Android Modem component over the network.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

Deeper analysisAI

CVE-2026-0114 is a vulnerability in the Modem component of Android systems, involving an out-of-bounds write due to an incorrect bounds check, classified under CWE-787. Published on 2026-03-10, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity. The issue affects Android devices, with specific details covered in general and Pixel-focused security bulletins.

Remote attackers can exploit this vulnerability over the network without authentication, privileges, or user interaction. Successful exploitation enables remote code execution, granting high-impact access to confidentiality, integrity, and availability on the targeted device.

Android security advisories at https://source.android.com/docs/security/bulletin/2026/2026-03-01 and https://source.android.com/docs/security/bulletin/pixel/2026/2026-03-01 provide details on patches and mitigation for affected versions.

Details

CWE(s)

Affected Products

google
android
all versions

CVEs Like This One

CVE-2026-0116Same product: Google Android
CVE-2025-36937Same product: Google Android
CVE-2026-0120Same product: Google Android
CVE-2026-0113Same product: Google Android
CVE-2024-53842Same product: Google Android
CVE-2024-43096Same product: Google Android
CVE-2024-49748Same product: Google Android
CVE-2024-43768Same product: Google Android
CVE-2026-0123Same product: Google Android
CVE-2026-0010Same product: Google Android

References