top of page
perceptive_background_267k.jpg

AGL app-framework-binder (afb-daemon) through v19.90.0 allows any local process to execute privileged supervision commands (Exit, Do, Sclose, Config, Trace, Deb…

Published:

30 april 2026 om 22:00:00

Alert date:

1 mei 2026 om 18:06:04

Source:

nvd.nist.gov

Click to open the original link from this advisory

Mobile & IoT, Operating Systems

CVE-2026-37526 affects AGL app-framework-binder (afb-daemon) through version 19.90.0, allowing local processes to execute privileged supervision commands without authentication via an abstract Unix socket. The vulnerability exists in the on_supervision_call function which dispatches 8 commands (Exit, Do, Sclose, Config, Trace, Debug, Token, slist) without credential verification. Low-privileged local processes can exploit this to kill the daemon (DoS), execute arbitrary API calls, close user sessions, or leak configuration data. The abstract socket lacks DAC protection and the vulnerability was introduced in a 2017 commit.

Technical details

Mitigation steps:

Affected products:

AGL app-framework-binder
afb-daemon

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page