LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-0023 - Vulnerability Analysis

HighCVSS: 8.4

Last Updated: March 3, 2026

Android PackageInstallerService - Broken Access Control

Published: March 2, 2026Updated: March 3, 2026

Overview

Android PackageInstallerService contains a broken access control caused by missing permission check in createSessionInternal, letting local attackers escalate privileges without additional execution rights, exploit requires no user interaction.

Severity & Score

Severity: High
CVSS Score: 8.4
EPSS Score: 0.5%(Probability of exploitation in next 30 days)

Impact

Local attackers can escalate privileges without needing additional execution rights, potentially gaining unauthorized access.

Mitigation

Update to the latest available version with the fix.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 3, 2026

🟠 CVE-2026-0023 - High (8.4) In createSessionInternal of PackageInstallerService.java, there is a possible way for an app to update its ownership due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-0023/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-0023
Severity
High
CVSS Score
8.4
Type
broken_access_control
Status
modified
EPSS
0.5%
Social Posts
1

CWE

  • CWE-862
  • CWE-269

CVSS Metrics

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

0.5%Probability of exploitation in the next 30 days