[CIVN-2026-0126] Multiple Vulnerabilities in Android OS

By Published On: March 11, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Android OS


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: CRITICAL


Software Affected


OpenSSL version 3.6.

OpenSSL version 3.5.

OpenSSL version 3.4.

OpenSSL version 3.3.

OpenSSL version 3.0.

OpenSSL version 1.1.1

OpenSSL version 1.0.2

Overview


Multiple vulnerabilities have been identified in Android which could be exploited by an attacker to execute arbitrary code causing denial of service, privilege escalation or disclosure sensitive information on the targeted system.


Target Audience:

All end-user organizations and individuals using Android.


Risk Assessment:

Risk of remote code execution, denial of service, privilege escalation and sensitive information disclosure.


Impact Assessment:

Potential compromise of system, service disruption and unauthorized access to sensitive information.


Description


Android is an open-source operating system primarily designed for mobile devices, including smart phones, tablets, smart watches, and other embedded system.


Multiple vulnerabilities exist in Android due to flaws in Android bug ID, Qualcomm reference number, MediaTek reference number, NVIDIA reference number, Broadcom reference number, UNISOC reference number.


Successful exploitation of these vulnerabilities could allow a remote attacker to trigger remote code execution, denial of service condition, gain elevated privileges and obtain sensitive information on the targeted system.


Solution


Apply appropriate updates as mentioned by the vendor:

https://source.android.com/docs/security/bulletin/2026/2026-03-01



Vendor Information


Android

https://source.android.com/docs/security/bulletin/2026/2026-03-01


References


Android

https://source.android.com/docs/security/bulletin/2026/2026-03-01


CVE Name

CVE-2026-0047

CVE-2025-32313

CVE-2025-48544

CVE-2025-48567

CVE-2025-48568

CVE-2025-48574

CVE-2025-48577

CVE-2025-48578

CVE-2025-48579

CVE-2025-48582

CVE-2025-48605

CVE-2025-48619

CVE-2025-48634

CVE-2025-48635

CVE-2025-48645

CVE-2025-48646

CVE-2025-48654

CVE-2026-0007

CVE-2026-0008

CVE-2026-0010

CVE-2026-0011

CVE-2026-0013

CVE-2026-0020

CVE-2026-0023

CVE-2026-0026

CVE-2026-0034

CVE-2026-0012

CVE-2026-0025

CVE-2025-48644

CVE-2026-0014

CVE-2026-0015

CVE-2026-0006

CVE-2025-48631

CVE-2025-48602

CVE-2025-48641

CVE-2025-48650

CVE-2025-48653

CVE-2026-0017

CVE-2026-0021

CVE-2026-0035

CVE-2024-43766

CVE-2025-48642

CVE-2025-64783

CVE-2025-64784

CVE-2025-64893

CVE-2026-0005

CVE-2026-0024

CVE-2025-48585

CVE-2025-48587

CVE-2024-43859

CVE-2025-48609

CVE-2026-0037

CVE-2026-0038

CVE-2025-38616

CVE-2025-38618

CVE-2025-39682

CVE-2025-39946

CVE-2026-0029

CVE-2026-0027

CVE-2026-0028

CVE-2026-0030

CVE-2026-0031

CVE-2025-40266

CVE-2026-0032

CVE-2025-2879

CVE-2025-10865

CVE-2025-58407

CVE-2025-58408

CVE-2025-58409

CVE-2025-58411

CVE-2026-21735

CVE-2025-20795

CVE-2026-20425

CVE-2026-20426

CVE-2026-20427

CVE-2026-20428

CVE-2026-20434

CVE-2025-20760

CVE-2025-20761

CVE-2025-20762

CVE-2025-20793

CVE-2025-20794

CVE-2026-20401

CVE-2026-20402

CVE-2026-20403

CVE-2026-20404

CVE-2026-20405

CVE-2026-20406

CVE-2026-20420

CVE-2026-20421

CVE-2026-20422

CVE-2025-48613

CVE-2025-61612

CVE-2025-61613

CVE-2025-61614

CVE-2025-61615

CVE-2025-61616

CVE-2025-69278

CVE-2025-69279

CVE-2025-47388

CVE-2025-47394

CVE-2025-47396

CVE-2025-47397

CVE-2025-47398

CVE-2025-59600

CVE-2026-21385

CVE-2025-47339

CVE-2025-47346

CVE-2025-47348

CVE-2025-47366

CVE-2025-47378

CVE-2025-47385

CVE-2025-47395

CVE-2025-47402




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmxdckACgkQ3jCgcSdc

ys82thAAlXujTf5AR5BFKoiqnb5P91j87Thd2CT8whkjliP3Be23ebWp3S5SAC/y

J6quhkawAHqkwiLvR//A9wRI1uuOuukpvZrl1gL36OLfI+1ahmNtzbdjgMdsX1Xr

+5pXWLD5sY4HmgBrKWS7rcyhe5UBr5lJubYC9zbV/SIxVCox/cm3CWfuHRA8Xlpb

WP537MgLDmNpRtfna7/+Rp0WuW2CtViDgWZTfxTPMx+uPQ0aGqz4jmj0LpHNGkHv

UDSODU2pAPSp7DJI1ElI1IPzQEnfZAD06/mKg6Dn16pD7j/wCq2NpI1W72QgnwZV

y4gi0t/vinvfsbLisiqBPnR2A0conKo4oshV0CdjeFtRdnnKDs9FO3fSvCWMqyjq

G0fXGRYmTQhOqjE73HDi/lckrnMBk9TFTUqnZ3z/soFxhzw5Iy6HuCCkPWUE0p6Q

jzpuem+ALdO3v6FKRicaBel8CFxwEdTiA6/UtH58BuzcpvQSpsXL52zNVixXv8sf

7HDmwEsOTev05ZCDwquU6Bwszf0G3hF2vfPIZT4WM3NYw2f3AOPkEzpzh7I19yW+

3qspvshUFNIqtSDYGdzOO94mrY8oTTk5hqOlwhXeExP+0yrmWIauDOGqYQedAlhC

dPtOLHibHH2CXVkBKeg+n7hvt+oNDXqC4UbXsUjZD4/aHZ5za1I=

=E5RP

—–END PGP SIGNATURE—–

Share this article