[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f1lpT2mYtgbEGdra-bk5nO4t-ESwIkGDX6gPXPBKzZCw":3},{"article":4,"iocs":39},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":28,"category":29,"article_tags":33},"3bb21f00-4663-464f-96e2-8bd3d02f8c5e","Critical Remote Code Execution Vulnerability Patched in Android","critical-remote-code-execution-vulnerability-patched-in-android-9501fe","CVE-2026-0073 affects Android’s System component and it can be exploited without any user interaction. The post Critical Remote Code Execution Vulnerability Patched in Android appeared first on SecurityWeek.","Google released an Android security update addressing CVE-2026-0073, a critical remote code execution vulnerability in the Android System component that impacts the Android Debug Bridge (adbd) daemon. The flaw allows attackers to execute code as the shell user without user interaction or additional privileges. No active exploitation in the wild has been reported to date.","Google patches critical RCE vulnerability in Android System component affecting Android Debug Bridge daemon.","Google announced on Monday the release of an Android update patching a critical vulnerability that can be exploited for remote code execution. The flaw, tracked as CVE-2026-0073, affects Android’s System component, allowing an attacker to exploit it to execute code as the shell user without additional execution privileges. User interaction is not required for exploitation. The advisory reveals that the issue impacts ‘adbd’ (Android Debug Bridge daemon), a background process running on Android devices that manages communication between the device and a computer, facilitating debugging and shell access. Google has informed users that no patches have been released this month for Wear OS, Pixel Watch, Android XR, and Android Automotive. There is no indication that CVE-2026-0073 has been exploited in malicious attacks. Only one Android vulnerability patched this year has been flagged as exploited in the wild. Advertisement. Scroll to continue reading. Several flaws were exploited in attacks last year, including CVE-2024-43093, CVE-2024-50302, CVE‑2025‑27038, CVE-2025-48543, and CVE-2025-38352. Google announced last week that it has significantly increased maximum bug bounty payouts for Android device vulnerabilities, offering up to $1.5 million for a zero-click Pixel Titan M exploit with persistence. Related: Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users Related: Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access Related: Severe StrongBox Vulnerability Patched in Android Written By Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State HackingAttackers Could Exploit AI Vision Models Using Imperceptible Image ChangesClaude AI Guided Hackers Toward OT Assets During Water Utility IntrusionRomanian Man Extradited to US for Role in Hacking Scheme 17 Years AgoCISA Launches ‘CI Fortify’ to Prepare Critical Infrastructure for Geopolitical Cyber ConflictPalo Alto Networks to Patch Zero-Day Exploited to Hack FirewallsMicrosoft Warns of Sophisticated Phishing Campaign Targeting US OrganizationsWhatsApp Discloses File Spoofing, Arbitrary URL Scheme Vulnerabilities Latest News In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director FrontrunnerPolish Security Agency Reports ICS Breaches at Five Water Treatment PlantsAI Firm Braintrust Prompts API Key Rotation After Data BreachCyberattack Hits Canvas System Used by Thousands of Schools as Finals Loom‘PCPJack’ Worm Removes TeamPCP Infections, Steals CredentialsRansomware Group Takes Credit for Trellix HackVulnerability in Claude Extension for Chrome Exposes AI Agent to TakeoverIvanti Patches EPMM Zero-Day Exploited in Targeted Attacks Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveMalwarebytes has named Chung Ip as Chief Financial Officer.Semperis has appointed John Podboy as Chief Information Security Officer.Randy Menon has become Chief Product and Marketing Officer at One Identity.More People On The MoveExpert Insights The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) Flipboard Reddit Whatsapp Whatsapp Email","https:\u002F\u002Fwww.securityweek.com\u002Fcritical-remote-code-execution-vulnerability-patched-in-android-2\u002F","https:\u002F\u002Fwww.securityweek.com\u002Fwp-content\u002Fuploads\u002F2025\u002F02\u002FAndroid-update.jpeg","2026-05-05T11:58:44+00:00","2026-05-05T12:00:12.884947+00:00",9,[18,21,24,26],{"name":19,"type":20},"Google","vendor",{"name":22,"type":23},"Android","product",{"name":25,"type":23},"Android Debug Bridge (adbd)",{"name":27,"type":23},"Pixel Titan M","80544778-fabb-4dcd-aa35-17492e5dcf4f",{"id":28,"icon":30,"name":31,"slug":32},null,"Vulnerabilities","vulnerabilities",[34],{"category":35},{"id":36,"icon":30,"name":37,"slug":38},"574f766a-fb3f-487c-8d2c-0720ae75471b","Zero-day","zero-day",[40,44,47,49,51,53],{"type":41,"value":42,"context":43},"cve","CVE-2026-0073","Critical RCE vulnerability in Android System component affecting adbd daemon",{"type":41,"value":45,"context":46},"CVE-2024-43093","Previously exploited Android vulnerability",{"type":41,"value":48,"context":46},"CVE-2024-50302",{"type":41,"value":50,"context":46},"CVE-2025-27038",{"type":41,"value":52,"context":46},"CVE-2025-48543",{"type":41,"value":54,"context":46},"CVE-2025-38352"]