SB2026030414 - Multiple vulnerabilities in Google Pixel
Published: March 4, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 20 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2026-0117)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the MFC subcomponent in Pixel. A local application can execute arbitrary code.
2) Improper input validation (CVE-ID: CVE-2026-0109)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Wifi Functional patchesFor details on the new bug fixes and functional patches included in thisrelease, refer to the Pixel Community forum.Common questions and answersThis section answers common questions that may occur after reading thisbulletin.1. How do I determine if my device is updated to address these issues?Security patch levels of 2026-03-05 or later address all issues associated with the 2026-03-05 security patch level and all previous patch levels. To learn how to check a device\'s security patch level, read the instructions on the Google device update schedule.2. What do the entries in the Type column mean?Entries in the Type column of the vulnerability details table reference the classification of the security vulnerability. subcomponent in Pixel. A local application can perform a denial of service (DoS) attack.
3) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2026-0115)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Trusted Execution Environment subcomponent in Pixel. A local application can gain access to sensitive information.
4) Improper input validation (CVE-ID: CVE-2026-0123)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the AOC subcomponent in Pixel. A local application can execute arbitrary code.
5) Improper input validation (CVE-ID: CVE-2025-36920)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the pKVM subcomponent in Pixel. A local application can execute arbitrary code.
6) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2026-0121)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the VPU subcomponent in Pixel. A local application can gain access to sensitive information.
7) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2026-0108)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the GPU subcomponent in Pixel. A local application can gain access to sensitive information.
8) Improper input validation (CVE-ID: CVE-2026-0119)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Shannon Baseband subcomponent in Pixel. A local application can execute arbitrary code.
9) Improper input validation (CVE-ID: CVE-2026-0118)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the oobconfig subcomponent in Pixel. A local application can execute arbitrary code.
10) Improper input validation (CVE-ID: CVE-2026-0113)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Cellular Modem subcomponent in Pixel. A local application can execute arbitrary code.
11) Improper input validation (CVE-ID: CVE-2026-0114)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the Modem subcomponent in Pixel. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.
12) Improper input validation (CVE-ID: CVE-2026-0112)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the VPU subcomponent in Pixel. A local application can execute arbitrary code.
13) Improper input validation (CVE-ID: CVE-2026-0111)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Cellular Modem subcomponent in Pixel. A local application can execute arbitrary code.
14) Improper input validation (CVE-ID: CVE-2026-0110)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Modem subcomponent in Pixel. A local application can execute arbitrary code.
15) Improper input validation (CVE-ID: CVE-2026-0107)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the CPM subcomponent in Pixel. A local application can execute arbitrary code.
16) Improper input validation (CVE-ID: CVE-2025-48611)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Companion subcomponent in Pixel. A local application can execute arbitrary code.
17) Improper input validation (CVE-ID: CVE-2026-0116)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the MFC subcomponent in Pixel. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.
18) Information exposure (CVE-ID: CVE-2024-56184)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Trusty subcomponent in Pixel. A local application can gain access to sensitive information.
19) Improper input validation (CVE-ID: CVE-2026-0122)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the Baseband subcomponent in Pixel. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.
20) Improper input validation (CVE-ID: CVE-2026-0120)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the Modem subcomponent in Pixel. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.
Remediation
Install update from vendor's website.