The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-0013

CVE-2026-0013: Google Android Privilege Escalation Flaw

CVE-2026-0013 is a privilege escalation vulnerability in Google Android that allows attackers to start activities as DocumentsUI through a confused deputy flaw. This article covers technical details, affected versions, and mitigation.

Published: March 6, 2026

CVE-2026-0013 Overview

A confused deputy vulnerability exists in the setupLayout function of PickActivity.java within Google Android's DocumentsUI application. This security flaw allows a malicious application to leverage the DocumentsUI app's privileges to start arbitrary activities, effectively bypassing normal security restrictions. The vulnerability enables local privilege escalation without requiring any additional execution privileges or user interaction.

Critical Impact

Attackers can exploit this confused deputy vulnerability to escalate privileges locally, potentially gaining unauthorized access to protected system resources and sensitive data by impersonating the DocumentsUI application's trusted context.

Affected Products

  • Google Android 14.0
  • Google Android 15.0
  • Google Android 16.0

Discovery Timeline

  • 2026-03-02 - CVE CVE-2026-0013 published to NVD
  • 2026-03-03 - Last updated in NVD database

Technical Details for CVE-2026-0013

Vulnerability Analysis

This vulnerability represents a classic confused deputy attack scenario within Android's DocumentsUI component. The DocumentsUI application is a privileged system application responsible for providing a unified file picker interface across Android. Due to improper validation in the setupLayout method of PickActivity.java, the component can be tricked into performing privileged actions on behalf of an untrusted caller application.

The confused deputy pattern (CWE-441) occurs when a privileged program is manipulated by a less privileged entity to misuse its authority. In this case, a malicious application can craft specific intents that cause PickActivity to launch arbitrary activities under the DocumentsUI app's identity and permissions, effectively bypassing Android's permission model and sandbox isolation.

Root Cause

The root cause lies in insufficient validation of intent parameters within the setupLayout method of PickActivity.java. When processing incoming intents, the activity fails to properly verify that the requested action is legitimate and authorized. This allows attackers to specify arbitrary activity components that the DocumentsUI app will launch with its elevated privileges, rather than the caller's restricted permissions.

Attack Vector

The attack is executed locally on the device. A malicious application installed on the target Android device can exploit this vulnerability by sending specially crafted intents to the DocumentsUI's PickActivity component. The attack does not require any special permissions for the malicious application, nor does it require user interaction. When the malicious intent is processed, PickActivity inadvertently starts the attacker-specified activity with DocumentsUI's system-level privileges, enabling unauthorized access to protected resources or actions that would normally be restricted.

The vulnerability is exploited through Android's intent mechanism. A malicious application constructs an intent targeting PickActivity with parameters designed to redirect execution flow to an arbitrary activity component. Since DocumentsUI runs with elevated system privileges, the launched activity inherits these privileges, allowing actions that the attacking application could not perform directly.

Detection Methods for CVE-2026-0013

Indicators of Compromise

  • Unusual activity launches originating from the DocumentsUI process targeting unexpected components
  • Suspicious intent activity involving PickActivity.java with non-standard parameters or target components
  • Unexpected privilege escalation events where unprivileged apps gain access to system-protected resources

Detection Strategies

  • Monitor Android system logs for abnormal intent routing patterns involving DocumentsUI and PickActivity
  • Implement runtime monitoring to detect privilege escalation attempts from untrusted applications
  • Deploy endpoint detection solutions capable of identifying confused deputy exploitation patterns on Android devices

Monitoring Recommendations

  • Enable verbose logging for the DocumentsUI application to capture all incoming intents and activity launches
  • Configure alerts for unusual inter-process communication patterns involving system applications
  • Regularly audit installed applications for behaviors consistent with privilege escalation attempts

How to Mitigate CVE-2026-0013

Immediate Actions Required

  • Apply the Android security patch from the Android Security Bulletin March 2026 immediately
  • Ensure all affected Android devices (versions 14.0, 15.0, and 16.0) are updated to the latest security patch level
  • Audit installed applications and remove any untrusted or suspicious applications that could attempt exploitation

Patch Information

Google has released security updates addressing this vulnerability in the Android Security Bulletin March 2026. Device manufacturers should integrate these patches into their firmware updates. End users should ensure their devices are running the March 2026 security patch level or later to be protected against this vulnerability.

Workarounds

  • Limit installation of applications to trusted sources (Google Play Store) with Google Play Protect enabled
  • Enable runtime permission monitoring through Android's built-in security features
  • Consider implementing mobile device management (MDM) solutions that can detect and prevent privilege escalation attempts
  • Restrict app sideloading on enterprise-managed devices until patches are applied

Organizations using SentinelOne Singularity Mobile can leverage its real-time threat detection capabilities to identify exploitation attempts and malicious applications targeting this vulnerability before successful privilege escalation occurs.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechGoogle Android

  • SeverityHIGH

  • CVSS Score8.4

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-441
  • Vendor Resources
  • Android Security Bulletin March 2026
  • Related CVEs
  • CVE-2025-36920: Google Android Privilege Escalation Flaw

  • CVE-2026-0107: Google Android Privilege Escalation Flaw

  • CVE-2026-0110: Google Android Privilege Escalation Flaw

  • CVE-2026-0111: Google Android Privilege Escalation Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English