Android Security

Google releases March 2026 Android Security Bulletin and Google Device Images

The Android Security Bulletin for March 2026, addresses a critical Android vulnerability

Google has released the March 2026 Android Security Bulletin, giving carriers and device makers a fresh set of patches to install.

Octopus Energy

Though Google puts out the Android security patches each month, the job of actually getting the fixes to end users falls on the telcos and/or device manufacturers themselves. Those partners vary in their ability to release the patches in a timely fashion.

The Android Security Bulletin contains details of security vulnerabilities affecting Android devices. Security patch levels of 05-01-2026 or later address all of these issues.

The most severe of these issues is a critical security vulnerability in the System component that could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation

The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.


Google’s March 2026 update contains patches for a total of 129 vulnerabilities.

A high-severity security flaw impacting an open-source Qualcomm component used in Android devices has been exploited in the wild.

The vulnerability in question is a buffer over-read in the Graphics component.

“Memory corruption when adding user-supplied data without checking available buffer space,” Qualcomm said, describing it as an integer overflow.


Alongside the bulletin, Google have released a security update to Google devices through an over-the-air (OTA) update. The Google device firmware images have also been released to the Google Developer site. Security patch levels of March 2026 or later address all of these issues.

The tables below contains a list of security vulnerabilities, the Common Vulnerability and Exposures ID (CVE), the assessed severity, and whether or not Google devices are affected. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are disabled for development purposes or if successfully bypassed.

Android and Google Service Mitigation’s

This is a summary of the mitigation’s provided by the Android security platform and service protections such as Google Play Protect. These capabilities reduce the likelihood that security vulnerabilities could be successfully exploited on Android.

  • Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. All users are encouraged to update to the latest version of Android where possible.
  • The Android security team actively monitors for abuse through Google Play Protect and warns users about Potentially Harmful Applications. Google Play Protect is enabled by default on devices with Google Mobile Services, and is especially important for users who install apps from outside of Google Play.

Terminology

You will find different types of vulnerabilities listed. Possible types include:

  • RCE – Remote code execution
  • EoP – Elevation of privilege
  • ID – Information disclosure
  • DoS – Denial of service
  • N/A – Classification not available

01-03-2026 security patch level—Vulnerability details

Framework

The most severe vulnerability in this section could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVEReferencesTypeSeverityUpdated AOSP versions
CVE-2026-0047A-465136263EoPCritical16-qpr2
CVE-2025-32313A-399155883EoPHigh14, 15, 16
CVE-2025-48544A-415783046EoPHigh14, 15, 16
CVE-2025-48567A-377888957EoPHigh14, 15, 16
CVE-2025-48568A-322157041EoPHigh14, 15
CVE-2025-48574A-428700812EoPHigh14, 15, 16
CVE-2025-48577A-413380719EoPHigh14, 15, 16
CVE-2025-48578A-418225717EoPHigh14, 15, 16
CVE-2025-48579A-417195606EoPHigh14, 15, 16
CVE-2025-48582A-369105011EoPHigh14, 15, 16
CVE-2025-48605A-395640609EoPHigh14, 15, 16
CVE-2025-48619A-414387646EoPHigh14, 15, 16
CVE-2025-48634A-406243581EoPHigh14, 15, 16
CVE-2025-48635A-446678690EoPHigh14, 15
CVE-2025-48645A-443062265EoPHigh14, 15, 16, 16-qpr2
CVE-2025-48646A-457742426EoPHigh14, 15, 16, 16-qpr2
CVE-2025-48654A-442392902EoPHigh16, 16-qpr2
CVE-2026-0007A-433251166EoPHigh14, 15, 16
CVE-2026-0008A-433252423EoPHigh16
CVE-2026-0010A-379695596EoPHigh14, 15, 16
CVE-2026-0011A-454062218EoPHigh14, 15, 16, 16-qpr2
CVE-2026-0013A-447135012EoPHigh14, 15, 16
CVE-2026-0020A-453649815EoPHigh14, 15, 16, 16-qpr2
CVE-2026-0023A-459461121EoPHigh14, 15, 16, 16-qpr2
CVE-2026-0026A-321711213EoPHigh14
CVE-2026-0034A-428701593EoPHigh14, 15, 16, 16-qpr2
CVE-2025-48630A-455563813IDHigh14, 15, 16, 16-qpr2
CVE-2026-0012A-392614656IDHigh14, 15, 16
CVE-2026-0025A-433746973IDHigh14, 15, 16, 16-qpr2
CVE-2025-48644A-449181366DoSHigh14, 15, 16, 16-qpr2
CVE-2026-0014A-443742082DoSHigh14, 15, 16, 16-qpr2
CVE-2026-0015A-445917646DoSHigh14, 15, 16, 16-qpr2

System

The most severe vulnerability in this section could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

CVEReferencesTypeSeverityUpdated AOSP versions
CVE-2026-0006A-423894847RCECritical16
CVE-2025-48631A-444671303DoSCritical14, 15, 16, 16-qpr2
CVE-2025-48602A-407562568EoPHigh14, 15, 16
CVE-2025-48641A-392699284EoPHigh14, 15, 16, 16-qpr2
CVE-2025-48650A-388530367EoPHigh14, 15, 16
CVE-2025-48653A-435737668EoPHigh14, 15, 16, 16-qpr2
CVE-2026-0017A-444673089EoPHigh16, 16-qpr2
CVE-2026-0021A-430047417EoPHigh14, 15, 16, 16-qpr2
CVE-2026-0035A-418773439EoPHigh14, 15, 16, 16-qpr2
CVE-2024-43766A-288144143IDHigh14, 15, 16
CVE-2025-48642A-455777515IDHigh14, 15, 16, 16-qpr2
CVE-2025-64783A-483074175IDHigh14, 15, 16, 16-qpr2
CVE-2025-64784A-483074618IDHigh14, 15, 16, 16-qpr2
CVE-2025-64893A-483075215IDHigh14, 15, 16, 16-qpr2
CVE-2026-0005A-366405211IDHigh14, 15, 16
CVE-2026-0024A-326211886IDHigh14, 15, 16, 16-qpr2
CVE-2025-48585A-425360742DoSHigh16
CVE-2025-48587A-425360073DoSHigh16
CVE-2025-48609A-414388731DoSHigh14, 15, 16

Google Play system updates

The following issues are included in Project Mainline components.

SubcomponentCVE
Documents UICVE-2026-0013
MediaProviderCVE-2025-48544, CVE-2025-48567, CVE-2025-48578, CVE-2025-48579, CVE-2025-48582
Media CodecsCVE-2026-0006
MediaProviderCVE-2026-0024, CVE-2026-0035
Permission ControllerCVE-2025-48653
ProfilingCVE-2025-48585, CVE-2025-48587

05-03-2026 security patch level—Vulnerability details

Kernel components

The most severe vulnerability in this section could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

CVEReferencesTypeSeveritySubcomponent
CVE-2024-43859A-455892000
Upstream kernel
EoPCriticalFlash-Friendly File System
CVE-2026-0037A-440584506
Upstream kernel
EoPCriticalProtected Kernel-Based Virtual Machine
CVE-2026-0038A-459479964
Upstream kernel
EoPCriticalHypervisor
CVE-2025-38616A-440544812
Upstream kernel 
EoPHighTransport Layer Security
CVE-2025-38618A-439253642
Upstream kernel
EoPHighvsock
CVE-2025-39682A-440544511
Upstream kernel
EoPHighTransport Layer Security
CVE-2025-39946A-446648770
Upstream kernel 
EoPHighTransport Layer Security
CVE-2026-0029A-443668075
Upstream kernel
EoPHighProtected Kernel-Based Virtual Machine
CVE-2026-0027A-456069704
Upstream kernel
EoPCriticalProtected Kernel-Based Virtual Machine
CVE-2026-0028A-443123065
Upstream kernel
EoPCriticalpKVM
CVE-2026-0030A-441808375
Upstream kernel
EoPCriticalpKVM
CVE-2026-0031A-443072657
Upstream kernel
EoPCriticalpKVM
CVE-2025-39946A-432728472
Upstream kernel
EoPHighTLS
CVE-2025-40266A-439862698
Upstream kernel
EoPHighpKVM
CVE-2026-0032A-439996285
Upstream kernel
EoPHighpKVM

Arm components

This vulnerability affects Arm components and further details are available directly from Arm. The severity assessment of this issue is provided directly by Arm.

CVEReferencesSeveritySubcomponent
CVE-2025-2879A-427973176HighMali

Imagination Technologies components

These vulnerabilities affect Imagination Technologies components and further details are available directly from Imagination Technologies. The severity assessment of these issues is provided directly by Imagination Technologies.

CVEReferencesSeveritySubcomponent
CVE-2025-10865A-449129642HighPowerVR-GPU
CVE-2025-13952A-464496427HighPowerVR-GPU
CVE-2025-58407A-449121737HighPowerVR-GPU
CVE-2025-58408A-429381685HighPowerVR-GPU
CVE-2025-58409A-440384860HighPowerVR-GPU
CVE-2025-58411A-449122377HighPowerVR-GPU
CVE-2026-21735A-450584982HighPowerVR-GPU

MediaTek components

These vulnerabilities affect MediaTek components and further details are available directly from MediaTek. The severity assessment of these issues is provided directly by MediaTek.

CVEReferencesSeveritySubcomponent
CVE-2025-20795A-457250114
M-ALPS10276761
HighKeyInstall
CVE-2026-20425A-473379718
M-ALPS10320471
Highdisplay
CVE-2026-20426A-473321948
M-ALPS10320471
Highdisplay
CVE-2026-20427A-473385373
M-ALPS10320471
Highdisplay
CVE-2026-20428A-473385374
M-ALPS10320471
Highdisplay
CVE-2026-20434A-473385376
M-MOLY00782946
HighModem
CVE-2025-20760A-457246939
M-MOLY01676750
HighModem
CVE-2025-20761A-457250116
M-MOLY01311265
HighModem
CVE-2025-20762A-457246938
M-MOLY01685181
HighModem
CVE-2025-20793A-457250115
M-MOLY01430930
HighModem
CVE-2025-20794A-457251533
M-MOLY01689259
M-MOLY01586470
HighModem
CVE-2026-20401A-464955064
M-MOLY01738310
HighModem
CVE-2026-20402A-464955066
M-MOLY00693083
HighModem
CVE-2026-20403A-464955070
M-MOLY01689259
M-MOLY01689254
HighModem
CVE-2026-20404A-464812757
M-MOLY01689248
HighModem
CVE-2026-20405A-464956288
M-MOLY01688495
HighModem
CVE-2026-20406A-464956289
M-MOLY01726634
HighModem
CVE-2026-20420A-464812755
M-MOLY01738313
HighModem
CVE-2026-20421A-464956284
M-MOLY01738293
HighModem
CVE-2026-20422A-464955069
M-MOLY00827332
HighModem

Misc OEM

This vulnerability affects Misc OEM components and further details are available directly from Misc OEM. The severity assessment of this issue is provided directly by Misc OEM.

CVEReferencesSeveritySubcomponent
CVE-2025-48613A-416491056HighVBMeta

Unisoc components

These vulnerabilities affect Unisoc components and further details are available directly from Unisoc. The severity assessment of these issues is provided directly by Unisoc.

CVEReferencesSeveritySubcomponent
CVE-2025-61612A-472608390
U-3145406
HighModem
CVE-2025-61613A-472608389
U-3145409
HighModem
CVE-2025-61614A-472596020
U-3145411
HighModem
CVE-2025-61615A-472596019
U-3145413
HighModem
CVE-2025-61616A-472596017
U-3145415
HighModem
CVE-2025-69278A-472608387
U-3145418
HighModem
CVE-2025-69279A-472596366
U-3145421
HighModem

Qualcomm components

These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.

CVEReferencesSeveritySubcomponent
CVE-2025-47388A-449733645
QC-CR#4207075
HighSecurity
CVE-2025-47394A-449732573
QC-CR#4202921
HighKernel
CVE-2025-47396A-449733129
QC-CR#4204623
HighDisplay
CVE-2025-47397A-457747735
QC-CR#4205207
HighDisplay
CVE-2025-47398A-457746802
QC-CR#4229974
HighDisplay
CVE-2025-59600A-465462602
QC-CR#4249775
HighDisplay
CVE-2026-21385A-478214401
QC-CR#4387106
HighDisplay

Qualcomm closed-source components

These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.

CVEReferencesSeveritySubcomponent
CVE-2025-47339A-430042394HighClosed-source component
CVE-2025-47346A-430043562HighClosed-source component
CVE-2025-47348A-430043784HighClosed-source component
CVE-2025-47366A-436259280HighClosed-source component
CVE-2025-47378A-442620485HighClosed-source component
CVE-2025-47385A-442621008HighClosed-source component
CVE-2025-47395A-449732115HighClosed-source component
CVE-2025-47402A-457748468HighClosed-source component

Full details of the March 2026 Android Security Bulletin are available here.