CVE-2026-21385 Exploited in Qualcomm Android Component
Summary
Hide ▲
Show ▼
Google confirmed that CVE-2026-21385, a high-severity buffer over-read vulnerability in Qualcomm's Graphics component, is being exploited in the wild. The flaw, reported to Qualcomm by Google's Android Security team, is an integer overflow leading to memory corruption. Google's March 2026 update includes patches for 129 vulnerabilities, including critical flaws in System, Framework, and Kernel components. The exploit is under limited, targeted use, but details on the exploitation method remain undisclosed. The vulnerability affects 235 Qualcomm chipsets and Android devices using the impacted Qualcomm component, with patches available in the March 2026 Android security bulletin.
Timeline
-
03.03.2026 09:08 2 articles · 1d ago
CVE-2026-21385 Exploited in Qualcomm Android Component
Google confirmed that CVE-2026-21385, a high-severity buffer over-read vulnerability in Qualcomm's Graphics component, is being exploited in the wild. The flaw was reported to Qualcomm by Google's Android Security team on December 18, 2025, and customers were notified on February 2, 2026. Google's March 2026 update includes patches for this vulnerability and 128 others, with indications of limited, targeted exploitation. The vulnerability affects 235 Qualcomm chipsets.
Show sources
- Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited — thehackernews.com — 03.03.2026 09:08
- Android gets patches for Qualcomm zero-day exploited in attacks — www.bleepingcomputer.com — 03.03.2026 10:19
Information Snippets
-
CVE-2026-21385 is a buffer over-read vulnerability in Qualcomm's Graphics component with a CVSS score of 7.8.
First reported: 03.03.2026 09:082 sources, 2 articlesShow sources
- Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited — thehackernews.com — 03.03.2026 09:08
- Android gets patches for Qualcomm zero-day exploited in attacks — www.bleepingcomputer.com — 03.03.2026 10:19
-
The vulnerability is an integer overflow leading to memory corruption when adding user-supplied data without checking available buffer space.
First reported: 03.03.2026 09:082 sources, 2 articlesShow sources
- Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited — thehackernews.com — 03.03.2026 09:08
- Android gets patches for Qualcomm zero-day exploited in attacks — www.bleepingcomputer.com — 03.03.2026 10:19
-
The flaw was reported to Qualcomm by Google's Android Security team on December 18, 2025.
First reported: 03.03.2026 09:082 sources, 2 articlesShow sources
- Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited — thehackernews.com — 03.03.2026 09:08
- Android gets patches for Qualcomm zero-day exploited in attacks — www.bleepingcomputer.com — 03.03.2026 10:19
-
Google acknowledged limited, targeted exploitation of CVE-2026-21385 in its March 2026 Android security bulletin.
First reported: 03.03.2026 09:082 sources, 2 articlesShow sources
- Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited — thehackernews.com — 03.03.2026 09:08
- Android gets patches for Qualcomm zero-day exploited in attacks — www.bleepingcomputer.com — 03.03.2026 10:19
-
Google's March 2026 update includes patches for 129 vulnerabilities, including critical flaws in System, Framework, and Kernel components.
First reported: 03.03.2026 09:082 sources, 2 articlesShow sources
- Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited — thehackernews.com — 03.03.2026 09:08
- Android gets patches for Qualcomm zero-day exploited in attacks — www.bleepingcomputer.com — 03.03.2026 10:19
-
The Android security bulletin includes two patch levels: 2026-03-01 and 2026-03-05.
First reported: 03.03.2026 09:082 sources, 2 articlesShow sources
- Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited — thehackernews.com — 03.03.2026 09:08
- Android gets patches for Qualcomm zero-day exploited in attacks — www.bleepingcomputer.com — 03.03.2026 10:19
-
The vulnerability affects 235 Qualcomm chipsets.
First reported: 03.03.2026 10:191 source, 1 articleShow sources
- Android gets patches for Qualcomm zero-day exploited in attacks — www.bleepingcomputer.com — 03.03.2026 10:19
-
The most severe of the fixed vulnerabilities is a critical security vulnerability in the System component that could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
First reported: 03.03.2026 10:191 source, 1 articleShow sources
- Android gets patches for Qualcomm zero-day exploited in attacks — www.bleepingcomputer.com — 03.03.2026 10:19
Similar Happenings
CVE-2026-2441: Chrome Zero-Day Exploited in the Wild
Google has released a patch for a high-severity use-after-free vulnerability (CVE-2026-2441) in Chrome's CSSFontFeatureValuesMap, which is actively being exploited. The flaw, discovered by Shaheen Fazim, allows remote attackers to execute arbitrary code within a sandbox via crafted HTML pages. Users are advised to update to versions 145.0.7632.75/76 for Windows and macOS, and 144.0.7559.75 for Linux. This is the first actively exploited zero-day in Chrome for 2026, highlighting the ongoing threat of browser-based vulnerabilities. The vulnerability was disclosed to the vendor on February 11, 2026, only two days before it was patched. The flaw can likely be exploited for arbitrary code execution by getting the targeted user to visit a malicious website, although an additional vulnerability is likely needed to escape the sandbox and achieve complete system takeover. The patch was tagged as "cherry-picked" (or backported) across multiple commits, indicating its importance and urgency. The commit message notes that the patch addresses "the immediate problem" but indicates there's "remaining work" tracked in bug 483936078, suggesting this might be a temporary fix or that related issues still need to be addressed. The update was published on February 13, 2026, and accompanied by an advisory on CVE-2026-2441. Google has restricted access to bug details and links until a majority of users are updated with a fix. Google released eight emergency patches for Chrome in 2025 to protect against actively exploited vulnerabilities.
Microsoft February 2026 Patch Tuesday Addresses 6 Zero-Days and 59 Flaws
Microsoft's February 2026 Patch Tuesday addresses 59 vulnerabilities, including 6 actively exploited zero-days and 3 publicly disclosed flaws. The updates include fixes for 5 critical vulnerabilities, with three being security feature bypass flaws in various Microsoft products. The zero-days span components such as Windows Shell, MSHTML Framework, Microsoft Word, Desktop Window Manager, Windows Remote Access Connection Manager, and Windows Remote Desktop Services. Microsoft issued an out-of-band patch for one of the zero-days, CVE-2026-21514, highlighting its urgency. The updates also cover a range of other vulnerabilities, including elevation of privilege, security feature bypass, remote code execution, information disclosure, denial of service, and spoofing flaws. Additionally, Microsoft has begun rolling out updated Secure Boot certificates to replace expiring 2011 certificates. Other vendors, including Adobe, BeyondTrust, CISA, Cisco, Fortinet, Google, n8n, and SAP, have also released security updates or advisories.
Google Patches Two Exploited Android Framework Vulnerabilities
Google released December 2025 Android security updates addressing 107 vulnerabilities, including two Framework bugs (CVE-2025-48633, CVE-2025-48572) actively exploited in limited, targeted attacks. The updates also fixed a critical Framework flaw (CVE-2025-48631) enabling remote DoS without additional privileges. Patches are available in two levels (2025-12-01, 2025-12-05) for faster manufacturer adoption. The vulnerabilities affect Android versions 13, 14, 15, and 16, and the patches will address 56 additional vulnerabilities affecting Android components in the kernel or third-party components. Similar flaws in the past were used for targeted exploitation by commercial spyware or nation-state operations targeting a small number of high-interest individuals. The updates address four critical-severity fixes for elevation-of-privilege flaws in the Kernel's Pkvm and UOMMU subcomponents, and two critical fixes for Qualcomm-powered devices (CVE-2025-47319 and CVE-2025-47372). Samsung published its security bulletin, including ported fixes from the Google update and vendor-specific fixes. Devices on Android 10 and later may receive some crucial fixes via Google Play system updates. Play Protect can detect and block documented malware and attack chains, so users of any Android version should keep the component up to date and active.
Microsoft September 2025 Patch Tuesday addresses 81 vulnerabilities, including two zero-days
Microsoft's November 2025 Patch Tuesday addressed 63 vulnerabilities, including one actively exploited zero-day vulnerability (CVE-2025-62215), a critical Remote Code Execution flaw (CVE-2025-60724), and several other notable vulnerabilities. The updates also included fixes for multiple elevation of privilege, remote code execution, information disclosure, denial-of-service, and spoofing vulnerabilities. Microsoft has released the first extended security update (ESU) for Windows 10, advising users to upgrade to Windows 11 or enroll in the ESU program. The KB5068781 update, the first Windows 10 extended security update since the operating system reached end of support on October 14, 2025, includes fixes for 63 flaws and one actively exploited elevation-of-privilege vulnerability. The September 2025 Patch Tuesday addressed 80 vulnerabilities, including 13 critical vulnerabilities. The updates fixed a range of issues, including privilege escalation, remote code execution, information disclosure, and denial-of-service vulnerabilities. The patches also covered a critical flaw in Azure Networking and addressed a new lateral movement technique dubbed BitLockMove. Additionally, security updates were released by multiple vendors, including Adobe, Cisco, Google, and others. The September 2025 update included 38 elevation of privilege (EoP) vulnerabilities. The two zero-day vulnerabilities were CVE-2025-55234 in Windows SMB Server and CVE-2024-21907 in Microsoft SQL Server. The SMB vulnerability was exploited through relay attacks, while the SQL Server flaw involved improper handling of exceptional conditions in Newtonsoft.Json. The updates also included hardening features for SMB Server to mitigate relay attacks, with recommendations for administrators to enable auditing to assess compatibility issues. The KB5065429 cumulative update for Windows 10 22H2 and 21H2 included fourteen fixes or changes, addressing unexpected UAC prompts and severe lag and stuttering issues with NDI streaming software. The update enabled auditing SMB client compatibility for SMB Server signing and SMB Server EPA, and included an opt-in feature for administrators to allow outbound network traffic from Windows 10 devices. In February 2026, Microsoft released updates to fix six actively exploited zero-day vulnerabilities, three of which have been publicly disclosed. These include CVE-2026-21510, CVE-2026-21513, CVE-2026-21514, CVE-2026-21519, CVE-2026-21525, and CVE-2026-21533. None of the actively exploited vulnerabilities are rated critical. In total, 25 CVEs disclosed by Microsoft were EoP, followed by remote code execution (12), spoofing (7), information disclosure (6), and security feature bypass (5). SAP also released 26 new security notes and one update to a previously released note, including critical vulnerabilities CVE-2026-0509 and CVE-2026-0488.
Two Android zero-day vulnerabilities exploited in targeted attacks
Google has released security updates for September 2025 to address 111 vulnerabilities in Android, including two zero-day flaws actively exploited in targeted attacks. The vulnerabilities, CVE-2025-38352 and CVE-2025-48543, allow for local privilege escalation without additional execution privileges or user interaction. The updates include two patch levels, 2025-09-01 and 2025-09-05, to provide flexibility for Android partners. The flaws affect the Linux Kernel and Android Runtime components. Google has not disclosed specific details about the attacks but has acknowledged limited, targeted exploitation. Benoît Sevens of Google's Threat Analysis Group (TAG) discovered the Linux Kernel flaw, suggesting it may have been used in targeted spyware attacks. The updates also address several other vulnerabilities, including remote code execution, privilege escalation, information disclosure, and denial-of-service issues in Framework and System components. The September 2025 update covers Android 13 through 16 and includes fixes for 27 Qualcomm components, bringing the total number of fixed flaws to 111. The September 2025 Android patches address 111 unique CVEs. The Linux kernel vulnerability (CVE-2025-38352) is a race condition related to POSIX CPU timers. The Android Runtime zero-day (CVE-2025-48543) is resolved in the 2025-09-01 security patch level. The 2025-09-05 security patch level fixes the Linux kernel bug and 51 other issues affecting various components. Google rolled out Pixel security updates resolving 23 vulnerabilities specific to Pixel devices. All vulnerabilities in the Android bulletin are resolved with updates to Wear OS, Pixel Watch, and Automotive OS.