
[CIVN-2026-0126] Multiple Vulnerabilities in Android OS
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Android OS
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
OpenSSL version 3.6.
OpenSSL version 3.5.
OpenSSL version 3.4.
OpenSSL version 3.3.
OpenSSL version 3.0.
OpenSSL version 1.1.1
OpenSSL version 1.0.2
Overview
Multiple vulnerabilities have been identified in Android which could be exploited by an attacker to execute arbitrary code causing denial of service, privilege escalation or disclosure sensitive information on the targeted system.
Target Audience:
All end-user organizations and individuals using Android.
Risk Assessment:
Risk of remote code execution, denial of service, privilege escalation and sensitive information disclosure.
Impact Assessment:
Potential compromise of system, service disruption and unauthorized access to sensitive information.
Description
Android is an open-source operating system primarily designed for mobile devices, including smart phones, tablets, smart watches, and other embedded system.
Multiple vulnerabilities exist in Android due to flaws in Android bug ID, Qualcomm reference number, MediaTek reference number, NVIDIA reference number, Broadcom reference number, UNISOC reference number.
Successful exploitation of these vulnerabilities could allow a remote attacker to trigger remote code execution, denial of service condition, gain elevated privileges and obtain sensitive information on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://source.android.com/docs/security/bulletin/2026/2026-03-01
Vendor Information
Android
https://source.android.com/docs/security/bulletin/2026/2026-03-01
References
Android
https://source.android.com/docs/security/bulletin/2026/2026-03-01
CVE Name
CVE-2026-0047
CVE-2025-32313
CVE-2025-48544
CVE-2025-48567
CVE-2025-48568
CVE-2025-48574
CVE-2025-48577
CVE-2025-48578
CVE-2025-48579
CVE-2025-48582
CVE-2025-48605
CVE-2025-48619
CVE-2025-48634
CVE-2025-48635
CVE-2025-48645
CVE-2025-48646
CVE-2025-48654
CVE-2026-0007
CVE-2026-0008
CVE-2026-0010
CVE-2026-0011
CVE-2026-0013
CVE-2026-0020
CVE-2026-0023
CVE-2026-0026
CVE-2026-0034
CVE-2026-0012
CVE-2026-0025
CVE-2025-48644
CVE-2026-0014
CVE-2026-0015
CVE-2026-0006
CVE-2025-48631
CVE-2025-48602
CVE-2025-48641
CVE-2025-48650
CVE-2025-48653
CVE-2026-0017
CVE-2026-0021
CVE-2026-0035
CVE-2024-43766
CVE-2025-48642
CVE-2025-64783
CVE-2025-64784
CVE-2025-64893
CVE-2026-0005
CVE-2026-0024
CVE-2025-48585
CVE-2025-48587
CVE-2024-43859
CVE-2025-48609
CVE-2026-0037
CVE-2026-0038
CVE-2025-38616
CVE-2025-38618
CVE-2025-39682
CVE-2025-39946
CVE-2026-0029
CVE-2026-0027
CVE-2026-0028
CVE-2026-0030
CVE-2026-0031
CVE-2025-40266
CVE-2026-0032
CVE-2025-2879
CVE-2025-10865
CVE-2025-58407
CVE-2025-58408
CVE-2025-58409
CVE-2025-58411
CVE-2026-21735
CVE-2025-20795
CVE-2026-20425
CVE-2026-20426
CVE-2026-20427
CVE-2026-20428
CVE-2026-20434
CVE-2025-20760
CVE-2025-20761
CVE-2025-20762
CVE-2025-20793
CVE-2025-20794
CVE-2026-20401
CVE-2026-20402
CVE-2026-20403
CVE-2026-20404
CVE-2026-20405
CVE-2026-20406
CVE-2026-20420
CVE-2026-20421
CVE-2026-20422
CVE-2025-48613
CVE-2025-61612
CVE-2025-61613
CVE-2025-61614
CVE-2025-61615
CVE-2025-61616
CVE-2025-69278
CVE-2025-69279
CVE-2025-47388
CVE-2025-47394
CVE-2025-47396
CVE-2025-47397
CVE-2025-47398
CVE-2025-59600
CVE-2026-21385
CVE-2025-47339
CVE-2025-47346
CVE-2025-47348
CVE-2025-47366
CVE-2025-47378
CVE-2025-47385
CVE-2025-47395
CVE-2025-47402
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=E5RP
—–END PGP SIGNATURE—–


