Cyber Posture

CVE-2026-0110

Critical

Published: 10 March 2026

Published
10 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0023 45.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

In MM_DATA_IND of cn_NrSmMsgHdlrFromMM.cpp, there is a possible EoP due to memory corruption. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 ensures timely remediation of the specific memory corruption flaw in MM_DATA_IND via patching as detailed in the Android Security Bulletin.

prevent

SI-16 implements memory protection mechanisms like ASLR and DEP to directly prevent exploitation of the memory corruption leading to remote EoP.

prevent

SI-10 enforces input validation on MM_DATA_IND messages to mitigate malformed data triggering the CWE-120 buffer copy without bounds check vulnerability.

Security SummaryAI

CVE-2026-0110 is a memory corruption vulnerability in the MM_DATA_IND function of cn_NrSmMsgHdlrFromMM.cpp, enabling escalation of privilege (EoP). Classified under CWE-120, it affects Android components, as documented in the Android Security Bulletin.

The vulnerability carries a CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity. Remote attackers require no privileges or user interaction to exploit it, achieving remote EoP without additional execution privileges needed.

The Android Security Bulletin for March 2026 (https://source.android.com/docs/security/bulletin/2026/2026-03-01) and the Pixel update bulletin (https://source.android.com/docs/security/bulletin/pixel/2026/2026-03-01) detail patches to mitigate the issue.

Details

CWE(s)

Affected Products

google
android
all versions

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The vulnerability is a remote memory corruption enabling privilege escalation (EoP) with no privileges required, directly mapping to Exploitation for Privilege Escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References