Cyber Posture

CVE-2026-20970

High

Published: 09 January 2026

Published
09 January 2026
Modified
15 January 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-20970 is a high-severity an unspecified weakness vulnerability in Samsung Android. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 requires enforcement of approved authorizations for access to system resources, directly addressing the improper access control allowing local low-privilege attackers to execute privileged APIs in SLocation.

prevent

AC-6 enforces least privilege, preventing low-privilege local attackers from gaining unauthorized access to privileged APIs in the SLocation component.

prevent

SI-2 mandates timely identification, reporting, and correction of system flaws, directly mitigating this vulnerability through patching as provided in SMR Jan-2026 Release 1.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Improper access control in SLocation directly enables local low-privileged attackers to invoke restricted privileged APIs, matching the definition of T1068 Exploitation for Privilege Escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper access control in SLocation prior to SMR Jan-2026 Release 1 allows local attackers to execute the privileged APIs.

Deeper analysisAI

CVE-2026-20970 is an improper access control vulnerability in the SLocation component, affecting Samsung devices prior to the SMR Jan-2026 Release 1. This flaw allows local attackers to execute privileged APIs that should otherwise be restricted, as detailed in the CVE description. The vulnerability has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact with relatively low barriers to exploitation.

A local attacker with low privileges on the affected device can exploit this vulnerability without requiring user interaction. Successful exploitation enables execution of privileged APIs in SLocation, potentially granting unauthorized access to sensitive location data or system functions, resulting in high impacts on confidentiality, integrity, and availability.

Samsung's security advisory for January 2026, available at https://security.samsungmobile.com/securityUpdate.smsb?year=2026&month=01, addresses this issue. Mitigation involves updating to SMR Jan-2026 Release 1 or later, which resolves the improper access control in SLocation.

Details

CWE(s)

Affected Products

samsung
android
15.0, 16.0

CVEs Like This One

CVE-2025-20890Same product: Samsung Android
CVE-2025-20888Same product: Samsung Android
CVE-2026-20971Same product: Samsung Android
CVE-2026-20979Same product: Samsung Android
CVE-2025-20903Same product: Samsung Android
CVE-2026-20983Same product: Samsung Android
CVE-2026-21010Same product: Samsung Android
CVE-2025-20882Same product: Samsung Android
CVE-2026-20990Same product: Samsung Android
CVE-2025-20881Same product: Samsung Android

References