CVE-2026-0007 Overview
CVE-2026-0007 is a local privilege escalation vulnerability in Google Android's WindowInfo.cpp component. The flaw exists in the writeToParcel function, which enables a tapjacking/overlay attack that can trick users into accepting permissions they did not intend to grant. This vulnerability allows attackers to escalate privileges locally without requiring any additional execution privileges or user interaction.
Critical Impact
This tapjacking vulnerability enables local privilege escalation by manipulating the Android window system to overlay malicious content, potentially allowing unauthorized permission grants without user awareness.
Affected Products
- Google Android 14.0
- Google Android 15.0
- Google Android 16.0
Discovery Timeline
- 2026-03-02 - CVE-2026-0007 published to NVD
- 2026-03-03 - Last updated in NVD database
Technical Details for CVE-2026-0007
Vulnerability Analysis
This vulnerability is classified under CWE-1021 (Improper Restriction of Rendered UI Layers or Frames), commonly known as a tapjacking or clickjacking vulnerability. The flaw resides in the writeToParcel function within WindowInfo.cpp, a core component of Android's window management system.
The vulnerability enables an attacker to create malicious overlay windows that can be positioned over legitimate permission dialogs. When a user attempts to interact with what appears to be a benign UI element, they are actually granting permissions to the attacker's application. The attack exploits how Android serializes and deserializes window information during inter-process communication (IPC) via the Parcel mechanism.
Root Cause
The root cause lies in improper handling of window layer information during the parcel serialization process. The writeToParcel function in WindowInfo.cpp fails to properly validate or restrict the window layering attributes, allowing malicious applications to position overlay windows in ways that should be restricted by the Android security model.
This enables attackers to create transparent or partially transparent overlays that intercept user touches while displaying content that appears to be from a trusted source. The window system should enforce strict ordering and visibility rules for permission dialogs to prevent such overlay attacks.
Attack Vector
The attack vector is local, requiring the attacker to have a malicious application installed on the target device. The attack proceeds as follows:
- The malicious application requests the SYSTEM_ALERT_WINDOW permission or exploits the vulnerability to bypass overlay restrictions
- When a legitimate permission dialog is about to be displayed, the attacker positions an overlay window
- The overlay displays benign-looking content (such as a game or utility interface) while hiding the actual permission request
- User interaction intended for the overlay is passed through to the underlying permission dialog
- The victim unknowingly grants sensitive permissions to the malicious application
The vulnerability does not require user interaction in the traditional sense—while the user does physically tap the screen, they are unaware they are granting permissions. No additional execution privileges are needed beyond what a standard Android application possesses.
Detection Methods for CVE-2026-0007
Indicators of Compromise
- Unexpected overlay permission requests from applications that should not require them
- Applications displaying content that momentarily flickers or shows unexpected layering behavior
- Permission grants appearing in system logs without corresponding user-visible dialogs
- Unusual WindowInfo or SurfaceFlinger entries in system logs indicating overlay manipulation
Detection Strategies
- Monitor for applications requesting SYSTEM_ALERT_WINDOW permission without legitimate use cases
- Implement runtime detection for overlay windows appearing simultaneously with permission dialogs
- Use Android's built-in overlay detection APIs to identify potentially malicious window layering
- Analyze application behavior patterns for timing correlation between overlay display and permission requests
Monitoring Recommendations
- Enable verbose logging for the window manager service to capture suspicious overlay activity
- Deploy mobile threat defense solutions capable of detecting tapjacking attack patterns
- Implement application vetting processes that flag apps requesting overlay permissions
- Monitor device logs for WindowInfo serialization anomalies
How to Mitigate CVE-2026-0007
Immediate Actions Required
- Apply the Android security patch from the Android Security Bulletin March 2026
- Review and revoke overlay permissions from untrusted applications
- Disable installation of apps from unknown sources on managed devices
- Deploy mobile device management (MDM) policies to restrict overlay-capable applications
Patch Information
Google has addressed this vulnerability in the March 2026 Android Security Bulletin. The patch corrects the writeToParcel function in WindowInfo.cpp to properly restrict window layering behavior and prevent malicious overlay positioning during sensitive operations like permission dialogs.
Device manufacturers should integrate the security patch level 2026-03-01 or later. Users should update their devices to the latest available firmware version that includes this patch. For enterprise environments, prioritize deployment of the security update through your MDM solution.
For detailed patch information, refer to the Android Security Bulletin March 2026.
Workarounds
- Enable "Disable permission auto-grant" in developer options if available on your device
- Manually review all granted permissions in Settings > Apps to identify suspicious grants
- Restrict app installation to Google Play Store only and enable Play Protect scanning
- For enterprise deployments, use allowlisting to control which applications can be installed
- Consider deploying a mobile threat defense solution that can detect and block tapjacking attempts
# ADB commands to review and manage overlay permissions
# List apps with SYSTEM_ALERT_WINDOW permission
adb shell dumpsys package | grep -A 1 "SYSTEM_ALERT_WINDOW"
# Revoke overlay permission from a specific package
adb shell appops set <package_name> SYSTEM_ALERT_WINDOW deny
# Check current permission state for a package
adb shell appops get <package_name> SYSTEM_ALERT_WINDOW
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


