Qualcomm Fixes Zero-Day Safety Vulnerabilities Used By Hackers, Cybercriminals

Qualcomm Fixes Zero-Day Safety Vulnerabilities Used By Hackers, Cybercriminals

Qualcomm has patched a number of safety flaws found in its merchandise, together with three zero-day vulnerabilities. The US chipmaker not too long ago introduced that these flaws may need been exploited by hackers to focus on affected gadgets. Customers should anticipate machine producers to roll out Qualcomm’s patches for the vulnerabilities that impression the Adreno graphics processing unit (GPU) driver on affected gadgets. Google Pixel gadgets which might be geared up with the corporate’s personal Tensor chips, are reportedly unaffected by the safety flaws.

Qualcomm Says Hackers Might Have Exploited Zero-Day Flaws

A safety bulletin printed on Monday reveals that Qualcomm has patched 10 proprietary software program points. The corporate has assigned two of those flaws a ‘Crucial’ safety score, whereas the others are marked as ‘Excessive’. These points are linked to graphics, core, the info community stack and connectivity, Wi-Fi {hardware} abstraction layer (HAL), and the Bluetooth host.

Out of the ten safety vulnerabilities patched by Qualcomm, the chipmaker has revealed that three zero-days (beforehand unknown flaws) could have been exploited by hackers in a focused marketing campaign. These are CVE-2025-21479 (Incorrect authorisation in graphics), CVE-2025-21480 (Incorrect authorisation in graphics home windows), CVE-2025-27038 (Use after free in graphics).

The descriptions of those safety flaws counsel that hackers might leverage them to realize unauthorised entry to a goal’s smartphone. These flaws are repeatedly found and patched by chipmakers, who’ve entry to the proprietary code for his or her chipsets.

Qualcomm has credited Google’s Menace Evaluation Group (TAG) with discovering and reporting these flaws, which had been subsequently patched. A Google spokesperson instructed TechCrunch that these safety flaws don’t have an effect on the corporate’s Pixel telephones, which run on in-house Tensor chips.

Whereas the safety flaws have been patched by Qualcomm, they nonetheless should be rolled out to consumer’s gadgets through software program updates. The chipmaker says it shared these patches with OEMs in Might and urged them to subject safety updates for gadgets “as quickly as potential”. Because of this, customers should wait till a software program replace is prepared for his or her gadgets, and this course of might take weeks.

Leave a Reply

Your email address will not be published. Required fields are marked *