Android gets patches for Qualcomm zero-day exploited in attacks

Published: (March 3, 2026 at 03:19 AM EST)
2 min read

Source: Bleeping Computer

Google has released security updates to patch 129 Android security vulnerabilities, including an actively exploited zero‑day flaw in a Qualcomm display component.

“There are indications that CVE‑2026‑21385 may be under limited, targeted exploitation,” the company said in its March 2025 Android Security Bulletin.
Source

Qualcomm revealed in a separate security advisory (issued February 3) that the flaw is an integer overflow (wraparound) in the Graphics subcomponent that local attackers can exploit to trigger memory corruption.
AdvisoryCommit showing the issue

Qualcomm was alerted to this high‑severity vulnerability on December 18 and notified customers on February 2. The February advisory notes that the flaw affects 235 Qualcomm chipsets, though it has not yet been flagged as exploited in attacks by NVD.
NVD entry for CVE‑2026‑21385

Patch details

  • Google fixed 10 critical security vulnerabilities in the System, Framework, and Kernel components. These issues could allow remote code execution, privilege escalation, or denial‑of‑service attacks.
  • The most severe is a critical vulnerability in the System component that could lead to remote code execution without any user interaction.
  • Two patch sets were released:
    • 2026‑03‑01 security patch level
      Details
    • 2026‑03‑05 security patch level (bundles all fixes from the first batch plus additional patches for closed‑source third‑party and kernel subcomponents)
      Details

Google Pixel devices receive these updates immediately, while other vendors may take longer to test and adapt them for specific hardware configurations.

Additional zero‑day patches

In December, Google also released patches for two other high‑severity zero‑day vulnerabilities (CVE‑2025‑48633 and CVE‑2025‑48572), both marked as “under limited, targeted exploitation.”
Related article

0 views
Back to Blog

Related posts

Read more »