CVE-2026-0028 - Vulnerability Analysis
HighCVSS: 8.4Last Updated: March 3, 2026
pkvm_host_share_guest - Integer Overflow
Overview
The pkvm_host_share_guest function in mem_protect.c contains an out of bounds write caused by an integer overflow, letting local attackers escalate privileges without additional execution rights, exploit requires no user interaction.
Severity & Score
Impact
Local attackers can escalate privileges, potentially gaining unauthorized access or control over the system.
Mitigation
Update to the latest version containing the fix.
References
- https://source.android.com/security/bulletin/2026-03-01
- https://android.googlesource.com/kernel/common/+/986614312222d4b3bdcf16840cdb4abdaed8a42d
- https://android.googlesource.com/kernel/common/+/aff2255dbe38dc7c57bac8d3ba9feed989289b20
- https://android.googlesource.com/kernel/common/+/f3a4b4d4a1fe2aface7de74ac257b8705b6de472
Social Media Activity(1 post)
š CVE-2026-0028 - High (8.4) In __pkvm_host_share_guest of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for ex... š https://www.thehackerwire.com/vulnerability/CVE-2026-0028/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-0028
- Severity
- High
- CVSS Score
- 8.4
- Type
- integer_overflow
- Status
- confirmed
- EPSS
- 0.8%
- Social Posts
- 1
CWE
- CWE-190
CVSS Metrics
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H