#VU123510 Improper input validation in Pixel - CVE-2026-0109

 

#VU123510 Improper input validation in Pixel - CVE-2026-0109

Published: March 4, 2026


Vulnerability identifier: #VU123510
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-0109
CWE-ID: CWE-20
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Pixel
Software vendor:
Google

Description

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Wifi Functional patchesFor details on the new bug fixes and functional patches included in thisrelease, refer to the Pixel Community forum.Common questions and answersThis section answers common questions that may occur after reading thisbulletin.1. How do I determine if my device is updated to address these issues?Security patch levels of 2026-03-05 or later address all issues associated with the 2026-03-05 security patch level and all previous patch levels. To learn how to check a device\'s security patch level, read the instructions on the Google device update schedule.2. What do the entries in the Type column mean?Entries in the Type column of the vulnerability details table reference the classification of the security vulnerability. subcomponent in Pixel. A local application can perform a denial of service (DoS) attack.


Remediation

Install security update from vendor's website.

External links