Critical Remote Code Execution Vulnerability Patched in Android
Security WeekArchived May 05, 2026✓ Full text saved
CVE-2026-0073 affects Android’s System component and it can be exploited without any user interaction. The post Critical Remote Code Execution Vulnerability Patched in Android appeared first on SecurityWeek .
Full text archived locally
✦ AI Summary· Claude Sonnet
Google announced on Monday the release of an Android update patching a critical vulnerability that can be exploited for remote code execution.
The flaw, tracked as CVE-2026-0073, affects Android’s System component, allowing an attacker to exploit it to execute code as the shell user without additional execution privileges. User interaction is not required for exploitation.
The advisory reveals that the issue impacts ‘adbd’ (Android Debug Bridge daemon), a background process running on Android devices that manages communication between the device and a computer, facilitating debugging and shell access.
Google has informed users that no patches have been released this month for Wear OS, Pixel Watch, Android XR, and Android Automotive.
There is no indication that CVE-2026-0073 has been exploited in malicious attacks.
Only one Android vulnerability patched this year has been flagged as exploited in the wild.
Several flaws were exploited in attacks last year, including CVE-2024-43093, CVE-2024-50302, CVE‑2025‑27038, CVE-2025-48543, and CVE-2025-38352.
Google announced last week that it has significantly increased maximum bug bounty payouts for Android device vulnerabilities, offering up to $1.5 million for a zero-click Pixel Titan M exploit with persistence.
Related: Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users
Related: Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access
Related: Severe StrongBox Vulnerability Patched in Android
WRITTEN BY
Eduard Kovacs
Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
OpenAI Rolls Out Advanced Security for ChatGPT Accounts
Google Adjusts Bug Bounties: Chrome Payouts Drop as Android Rewards Rise Amid AI Surge
Two US Security Experts Sentenced to Prison for Helping Ransomware Gang
Cisco Releases Open Source Tool for AI Model Provenance
FBI Warns of Surge in Hacker-Enabled Cargo Theft
Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks
EnOcean SmartServer Flaws Expose Buildings to Remote Hacking
Sandhills Medical Says Ransomware Breach Affects 170,000
Latest News
Critical, High-Severity Vulnerabilities Patched in Apache MINA, HTTP Server
Karakurt Ransomware Negotiator Sentenced to Prison
MetInfo, Weaver E-cology Vulnerabilities in Attackers’ Crosshairs
WhatsApp Discloses File Spoofing, Arbitrary URL Scheme Vulnerabilities
Cisco Moves to Acquire Astrix Security to Tackle Non-Human Identity Risks
Trellix Source Code Repository Breached
Cybersecurity M&A Roundup: 33 Deals Announced in April 2026
DigiCert Revokes Certificates After Support Portal Hack
Trending
Webinar: ROSI For CPS Security Programs
May 13, 2026
In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.
Register
Virtual Event: Threat Detection And Incident Response Summit
May 20, 2026
Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.
Register
People on the Move
Jacki Monson has joined CVS Health as SVP, Deputy CISO.
Gigi Schumm has been promoted to Chief Revenue Officer at Securonix.
Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.
More People On The Move
Expert Insights
The Mythos Moment: Enterprises Must Fight Agents With Agents
Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor)
Why Cybersecurity Must Rethink Defense In The Age Of Autonomous Agents
From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George)
Government Can’t Win The Cyber War Without The Private Sector
Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin)
The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security
Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb)
The New Rules Of Engagement: Matching Agentic Attack Speed
The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael)
Flipboard
Reddit
Whatsapp
Email