


Perceptive Security
SOC/SIEM Consultancy

AGL app-framework-binder (afb-daemon) through v19.90.0 allows any local process to execute privileged supervision commands (Exit, Do, Sclose, Config, Trace, Deb…
Published:
30 april 2026 om 22:00:00
Alert date:
1 mei 2026 om 18:06:04
Source:
nvd.nist.gov
Mobile & IoT, Operating Systems
CVE-2026-37526 affects AGL app-framework-binder (afb-daemon) through version 19.90.0, allowing local processes to execute privileged supervision commands without authentication via an abstract Unix socket. The vulnerability exists in the on_supervision_call function which dispatches 8 commands (Exit, Do, Sclose, Config, Trace, Debug, Token, slist) without credential verification. Low-privileged local processes can exploit this to kill the daemon (DoS), execute arbitrary API calls, close user sessions, or leak configuration data. The abstract socket lacks DAC protection and the vulnerability was introduced in a 2017 commit.
Technical details
Mitigation steps:
Affected products:
AGL app-framework-binder
afb-daemon
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-37526
https://gerrit.automotivelinux.org/gerrit/src/app-framework-binder
https://gist.github.com/sgInnora/8526eedcfd826d05ef1fc45d8f405643
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
