By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Zero-day in Android phone chips under active attack | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Zero-day in Android phone chips under active attack | Computer Weekly
News

Zero-day in Android phone chips under active attack | Computer Weekly

News Room
Last updated: 2026/03/04 at 11:32 PM
News Room Published 4 March 2026
Share
Zero-day in Android phone chips under active attack | Computer Weekly
SHARE

A zero-day vulnerability in the Qualcomm chipsets used by many Android mobile devices is being actively exploited in the wild, according to Google, and system users should apply the relevant updates as soon as possible.

Tracked as CVE-2026-21385, the flaw is a memory corruption vulnerability that arises from an integer overflow or graphics wraparound condition. Left unaddressed, it enables a threat actor to bypass security controls and take over the targeted system.

It affects well over 200 chipsets in widespread use, according to Qualcomm, which said it was first reported in December 2025 by the Google Android Security Team, and it notified its own customers on 2 February 2026, with fixes rolling out as long ago as January.

In its March Security Bulletin, which additionally addresses over 100 other flaws in Android and related components thereof, Google said “there are indications that CVE-2026-21385 may be under limited, targeted exploitation”.

Google’s choice of wording suggests that CVE-2026-21385 is being used by a state-linked surveillance operation as, historically, this has been the case with a great many zero-days that ultimately endanger smartphone devices.

However, Google has made no firm statement on this point, and nor has it provided any information on the minutiae of the attacks, or their victims, to date.

In its bulletin, Google additionally flagged CVE-2026-0047, a critical elevation of privilege (EoP) flaw, and CVE-2026-0006, a remote code execution (RCE) flaw, as warranting close attention from defenders.

Adam Boynton, senior enterprise strategy manager at Jamf, a specialist in Android and iOS security, said the Qualcomm zero-day would be of particular concern to security teams because although it has been patched by Google, it is OEMs and mobile carriers who really control when the patch trickles down down and reaches the actual devices in people’s pockets.

“In enterprise environments, that gap can stretch from days to months – and during that window, the vulnerability is public and the device is exposed,” he explained.

“Mobile is no longer a secondary attack surface, and organisations that treat it as such, by delaying updates, will be the ones that end up in incident reports.”

As of Tuesday 3 March, CVE-2026-21385 has also now been added to the Cybersecurity and Infrastructure Security Agency’s (Cisa’s) Known Exploited Vulnerabilities (Kev) catalogue. This obliges all agencies of the Federal Civilian Executive Branch (FECB) in the US to apply the Android patches by 24 March, and is a further signal of the potential scope, and damage, of the vulnerability to the wider enterprise community.

Apple not neglected

Meanwhile, on 3 March, Google’s in-house Threat Intelligence Group (GTIG) released details of a powerful exploit kit targeting Apple iPhone models running versions 13.0 through 17.2.01 of iOS.

The so-called Coruna kit is said to contain a set of five comprehensive iOS exploit chains comprising 23 total exploits – the most advanced of which use exploitation techniques and mitigation bypasses that are not yet public.

GTIG said it had tracked its use by a customer of an unnamed commercial spyware supplier, in a series of watering hole attacks targeting Ukrainian users, linked to Russian intelligence, and in a broad-scale campaign conducted by a financially motivated cyber criminal operator hailing from China – tracked as UNC6353.

“How this proliferation occurred is unclear, but suggests an active market for second-hand zero-day exploits,” the GTIG team said in their write-up.

“Beyond these identified exploits, multiple threat actors have now acquired advanced exploitation techniques that can be reused and modified with newly identified vulnerabilities.”

GTIG noted that Coruna is ineffective against devices running the latest version of iOS and encouraged all users to update their devices – or enable Lockdown Mode if this is not yet possible.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Apple’s New MacBook Neo Is Really Cheap (And Powered By An iPhone Chip) – BGR Apple’s New MacBook Neo Is Really Cheap (And Powered By An iPhone Chip) – BGR
Next Article Best TV deal: Get the 55-inch Samsung S90F OLED 4K Smart TV for its lowest price ever Best TV deal: Get the 55-inch Samsung S90F OLED 4K Smart TV for its lowest price ever
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
Computing
Pixel Now Playing starts rolling out a song-specific visual upgrade
Pixel Now Playing starts rolling out a song-specific visual upgrade
News
Huawei unveils MatePad Mini ahead of launch, targets iPad Mini market · TechNode
Huawei unveils MatePad Mini ahead of launch, targets iPad Mini market · TechNode
Computing
Cloudflare Debuts Markdown for Agents and Content Signals to Guide AI Crawlers
Cloudflare Debuts Markdown for Agents and Content Signals to Guide AI Crawlers
News

You Might also Like

Pixel Now Playing starts rolling out a song-specific visual upgrade
News

Pixel Now Playing starts rolling out a song-specific visual upgrade

3 Min Read
Cloudflare Debuts Markdown for Agents and Content Signals to Guide AI Crawlers
News

Cloudflare Debuts Markdown for Agents and Content Signals to Guide AI Crawlers

4 Min Read
Google Pixel 10a review: cheaper Android is great, but no real advance
News

Google Pixel 10a review: cheaper Android is great, but no real advance

7 Min Read
Google's Epic Settlement Brings Fortnite Back to Google Play, Plus Broad Dev Discounts
News

Google's Epic Settlement Brings Fortnite Back to Google Play, Plus Broad Dev Discounts

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?