PatchSiren cyber security CVE debrief
CVE-2017-0412 Google CVE debrief
CVE-2017-0412 is a high-severity Android elevation-of-privilege issue in Framework APIs. According to the vendor and NVD record, a local malicious application could execute arbitrary code in the context of a privileged process on affected Android 7.0 and 7.1.1 devices; NVD also lists Android 7.1.0 in the affected CPE set. The issue is mapped to CWE-367 and carries a CVSS 3.0 score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
- Vendor
- Product
- CVE-2017-0412
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-08
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-08
- Advisory updated
- 2026-05-13
Who should care
Android device owners and fleet operators, mobile security teams, endpoint defenders, and incident responders should care, especially where Android 7.0/7.1.x devices remain in service or allow installation of untrusted apps.
Technical summary
The NVD and Android security bulletin describe an elevation of privilege in Framework APIs that could let a local malicious application run code inside a privileged process. NVD classifies the weakness as CWE-367 and rates the impact as high across confidentiality, integrity, and availability. The record’s affected CPEs include Android 7.0, 7.1.0, and 7.1.1, while the CVE description specifically calls out 7.0 and 7.1.1. The issue is local in nature and requires user interaction per the CVSS vector.
Defensive priority
High
Recommended defensive actions
- Apply the relevant Android security bulletin fixes to affected devices as soon as available.
- Prioritize remediation or retirement of Android 7.0/7.1.x devices that remain in production or are allowed to install third-party apps.
- Review app installation and sideloading controls to reduce exposure to malicious local applications.
- Monitor affected devices for unusual privilege-related behavior or unexpected execution within system or privileged processes.
- Use the Android security bulletin and NVD record to validate whether specific device builds are still exposed.
Evidence notes
Primary evidence comes from the NVD CVE record and the Android vendor advisory referenced in the source corpus. The CVE description states that a local malicious application could execute arbitrary code within a privileged process. NVD lists CVSS 3.0 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H and CWE-367. The source corpus also includes third-party references (SecurityFocus, SecurityTracker) and an Exploit-DB URL; those references are noted but no exploit details are used here.
Official resources
-
CVE-2017-0412 CVE record
CVE.org
-
CVE-2017-0412 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
- Source reference
CVE published 2017-02-08T15:59:00.800Z; the referenced Android vendor bulletin is dated 2017-02-01, and the NVD record shows a later modified timestamp of 2026-05-13T00:24:29.033Z.