Android Update Fails to Patch Qualcomm Zero-Day Vulnerability: Security Concerns Rise

Android-Update-Fails-to-Patch-Qualcomm-Zero-Day-Vulnerability-Security-Concerns-Risedata

Google Rolls Out Android Security Updates to Patch Over 130 Vulnerabilities, Including Exploited Zero-Day

Google has released a new set of Android security updates that address nearly 130 vulnerabilities, including a zero-day flaw that has been exploited in the wild. The updates, which are part of the company’s regular security patch cycle, include fixes for a critical vulnerability in the Qualcomm graphics component that affects over 200 chipsets.

Exploited Vulnerability

The exploited vulnerability, tracked as CVE-2026-21385, is an integer overflow issue that can lead to memory corruption when using alignments for memory allocation.

According to Adam Boynton, senior enterprise strategy manager at Jamf, successful exploitation of the vulnerability could allow attackers to bypass security controls and gain unauthorized control over the system.

Qualcomm reported the vulnerability to Google’s Android Security team on December 18, 2025, and notified its customers on February 2. Google disclosed the vulnerability on Monday, noting that there are indications of limited, targeted exploitation. However, the company did not provide details on the observed attacks.

Patch Details

The vulnerability is patched in the second part of this month’s Android updates, which arrive on devices as the 2026-03-05 security patch level. This patch level also resolves over 60 vulnerabilities in kernel, Arm, Imagination Technologies, MediaTek, Unisoc, and Qualcomm components.

The first part of the updates, which rolled out as the 2026-03-01 security patch level, contains fixes for over 50 vulnerabilities in the Framework and System components, including critical flaws that could lead to remote code execution (RCE) and denial-of-service (DoS). The most severe of these issues is a critical security vulnerability in the System component that could lead to remote code execution with no additional execution privileges needed, and without requiring user interaction.

Wear OS and Other Updates

Google also announced the release of fixes for two Wear OS vulnerabilities, which impact the platform’s Framework and System components. The Wear OS update includes patches for all the security defects described in Android’s March 2026 security bulletin.

Devices running a security level of 2026-03-05 or higher contain patches for all the vulnerabilities addressed in this month’s Android updates. Google noted that there are no platform-specific patches in this month’s Android Automotive OS and Android XR updates.

Conclusion

The rollout of these security updates highlights the importance of regular patching and the need for device manufacturers to prioritize security in their products. As the threat landscape continues to evolve, it is crucial for organizations and individuals to stay informed about the latest security vulnerabilities and take proactive measures to protect their devices and data.


Blog Image

About Author

en_USEnglish