CVE-2026-0073
Android Open Source Project (AOSP) · adbd (Android Debug Bridge Daemon)
A vulnerability in the adbd_tls_verify_cert function of the Android Debug Bridge Daemon (adbd) affects certificate verification.
Executive summary
A high-severity flaw in the Android Debug Bridge Daemon (adbd) certificate verification process could allow for man-in-the-middle attacks.
Vulnerability
The issue exists within the adbd_tls_verify_cert function, which is responsible for validating TLS certificates during authentication. Improper validation could allow an attacker to bypass security checks during an ADB connection.
Business impact
With a CVSS score of 8.8, this vulnerability poses a High risk. Successful exploitation could allow an attacker to intercept or manipulate communications between the host and the Android device, leading to unauthorized command execution or data exfiltration.
Remediation
Immediate Action: Update the affected device firmware or platform components to the version containing the security patch for the adbd service.
Proactive Monitoring: Monitor for unexpected ADB connections or unauthorized authentication attempts within the development or production environment.
Compensating Controls: Disable ADB over network (TCP/IP) when not explicitly required for development or debugging purposes.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the sensitivity of the ADB interface, organizations should enforce strict access controls. Applying the vendor-provided security update is essential to ensure the integrity of the TLS verification process and protect device communications.