Jump to content
  • Sign Up
×
×
  • Create New...

Qualcomm Fixes Zero-Day Security Vulnerabilities Used By Hackers, Cybercriminals


Recommended Posts

  • Diamond Member

This is the hidden content, please

Qualcomm Fixes Zero-Day Security Vulnerabilities Used By Hackers, Cybercriminals

Qualcomm has patched multiple security flaws discovered in its products, including three zero-day vulnerabilities. The US chipmaker recently announced that these flaws might have been exploited by hackers to target affected devices. Users will have to wait for device manufacturers to roll out Qualcomm’s patches for the vulnerabilities that impact the Adreno graphics processing unit (GPU) driver on affected devices.

This is the hidden content, please
Pixel devices that are equipped with the company’s own Tensor chips, are reportedly unaffected by the security flaws.

Qualcomm Says Hackers May Have Exploited Zero-Day Flaws

A security bulletin published on Monday reveals that Qualcomm has

This is the hidden content, please
. The company has assigned two of these flaws a ‘Critical’ security rating, while the others are marked as ‘High’. These issues are linked to graphics, core, the data network stack and connectivity, Wi-Fi hardware abstraction layer (HAL), and the Bluetooth host.

Out of the 10 security vulnerabilities patched by Qualcomm, the chipmaker has revealed that three zero-days (previously unknown flaws) may have been exploited by hackers in a targeted campaign. These are CVE-2025-21479 (Incorrect authorisation in graphics), CVE-2025-21480 (Incorrect authorisation in graphics windows), CVE-2025-27038 (Use after free in graphics).

The descriptions of these security flaws suggest that hackers could leverage them to gain unauthorised access to a target’s smartphone. These flaws are regularly discovered and patched by chipmakers, who have access to the proprietary code for their chipsets.

Qualcomm has credited

This is the hidden content, please
’s Threat Analysis Group (TAG) with discovering and reporting these flaws, which were subsequently patched. A
This is the hidden content, please
spokesperson told TechCrunch that these security flaws
This is the hidden content, please
, which run on in-house Tensor chips.

While the security flaws have been patched by Qualcomm, they still need to be rolled out to user’s devices via software updates. The chipmaker says it shared these patches with OEMs in May and urged them to issue security updates for devices “as soon as possible”. As a result, users will have to wait until a software update is ready for their devices, and this process could take weeks.



This is the hidden content, please

#Qualcomm #Fixes #ZeroDay #Security #Vulnerabilities #Hackers #Cybercriminals

This is the hidden content, please

This is the hidden content, please

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.