Cyber Posture

CVE-2026-0114

Critical

Published: 10 March 2026

Published
10 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0023 45.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the CVE by requiring timely identification, reporting, and remediation of the out-of-bounds write flaw in the Android Modem component.

prevent

Mandates validation of information inputs to the Modem, preventing the out-of-bounds write caused by the incorrect bounds check on network data.

prevent

Implements memory safeguards such as non-executable regions and randomization to mitigate remote code execution from the Modem's out-of-bounds write vulnerability.

Security SummaryAI

CVE-2026-0114 is a vulnerability in the Modem component of Android systems, involving an out-of-bounds write due to an incorrect bounds check, classified under CWE-787. Published on 2026-03-10, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity. The issue affects Android devices, with specific details covered in general and Pixel-focused security bulletins.

Remote attackers can exploit this vulnerability over the network without authentication, privileges, or user interaction. Successful exploitation enables remote code execution, granting high-impact access to confidentiality, integrity, and availability on the targeted device.

Android security advisories at https://source.android.com/docs/security/bulletin/2026/2026-03-01 and https://source.android.com/docs/security/bulletin/pixel/2026/2026-03-01 provide details on patches and mitigation for affected versions.

Details

CWE(s)

Affected Products

google
android
all versions

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2026-0114 enables unauthenticated remote code execution by exploiting an out-of-bounds write in the public-facing Android Modem component over the network.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References