Qualcomm Resolves Three Zero-Day Vulnerabilities Targeting Android Devices Through Adreno GPU

June 02, 2025
Spyware / Vulnerability

Qualcomm has released security updates to address three zero-day vulnerabilities that have been exploited in limited, targeted attacks. These flaws, responsibly disclosed by the Google Android Security team, include:

  • CVE-2025-21479 and CVE-2025-21480 (CVSS score: 8.6): Two incorrect authorization vulnerabilities in the Graphics component that could lead to memory corruption due to unauthorized command execution in GPU microcode during specific command sequences.

  • CVE-2025-27038 (CVSS score: 7.5): A use-after-free vulnerability in the Graphics component that may result in memory corruption while rendering graphics using Adreno GPU drivers in Chrome.

According to Qualcomm’s advisory, the Google Threat Analysis Group has indicated that CVE-2025-21479, CVE-2025-21480, and CVE-2025-27038 might be under limited, targeted exploitation. Patches have been issued to resolve the vulnerabilities affecting the Adreno graphics architecture.

Qualcomm Addresses Critical Security Flaws Exploited in Targeted Android Attacks

On June 2, 2025, Qualcomm announced the release of vital security updates aimed at mitigating three zero-day vulnerabilities that have reportedly been leveraged in targeted attacks against Android devices. These vulnerabilities, identified in collaboration with the Google Android Security team, pose significant risks due to their potential exploitation in real-world scenarios.

The vulnerabilities include CVE-2025-21479 and CVE-2025-21480, both of which are categorized as incorrect authorization issues within the Graphics component. These flaws can lead to memory corruption as a result of unauthorized command executions in the GPU microcode when specific sequences are followed. The Common Vulnerability Scoring System (CVSS) rates these vulnerabilities with a high severity score of 8.6, indicating their critical nature and the potential for severe impact if exploited.

Another notable vulnerability, CVE-2025-27038, is classified as a use-after-free vulnerability within the Graphics component. This flaw can similarly result in memory corruption while rendering graphics through Adreno GPU drivers, particularly in the Chrome browser. This vulnerability rates slightly lower on the CVSS scale, with a score of 7.5, yet remains a significant concern within the cybersecurity landscape.

Qualcomm’s advisory highlights concerns raised by the Google Threat Analysis Group, suggesting that the aforementioned vulnerabilities are currently experiencing limited yet targeted exploitation. Such claims prompt scrutiny, particularly for businesses reliant on Android platforms, as the risks posed by these vulnerabilities could have implications for data security and operational integrity.

The targeting of Qualcomm’s GPU components draws attention to broader cybersecurity tactics potentially used by adversaries. According to the MITRE ATT&CK framework, the exploitation of these vulnerabilities might involve techniques related to initial access and privilege escalation. Specifically, attackers could gain unauthorized access to the system and exploit these vulnerabilities to execute arbitrary code, thereby increasing their control over affected devices.

Qualcomm’s prompt action to address these vulnerabilities underscores the urgency of implementing security measures for businesses utilizing Android technology. The affected devices, primarily found in sectors involving sensitive information, necessitate immediate updates to protect against these emerging threats.

For business owners, awareness and proactive management of such vulnerabilities are essential to safeguard against potentially devastating security breaches. The ongoing evolution of threats in the cybersecurity landscape emphasizes the importance of remaining informed and vigilant regarding software updates and vulnerability disclosures. As Qualcomm moves to mitigate these identified risks, all stakeholders must prioritize their cybersecurity strategies to adapt to the evolving threat environment.

Source link