Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Qualcomm Adreno GPU 0-Day Vulnerabilities Exploited to Attack Android Users

Posted on June 2, 2025June 2, 2025 By CWS

Cell chipmaker Qualcomm has issued pressing safety patches for 3 essential zero-day vulnerabilities in its Adreno GPU drivers which can be actively being exploited in focused assaults towards Android customers worldwide.

The corporate confirmed that patches for the vulnerabilities have been distributed to gadget producers with robust suggestions for instant deployment.

The Google Risk Evaluation Group has supplied indications that three vulnerabilities, CVE-2025-21479, CVE-2025-21480, and CVE-2025-27038,”could also be beneath restricted, focused exploitation.”

This represents a big safety risk as billions of Android units worldwide depend on Qualcomm’s Adreno GPU know-how throughout a number of smartphone producers, together with Samsung, Google, Xiaomi, and OnePlus.

0-Day Vulnerabilities Exploited

CVE-2025-21479 and CVE-2025-21480 are categorized as essential vulnerabilities with CVSS scores of 8.6, representing incorrect authorization flaws within the Graphics part.

These vulnerabilities allow reminiscence corruption by unauthorized command execution in GPU microcode throughout particular command sequences. Attackers can exploit these flaws to execute rogue instructions that corrupt system reminiscence, doubtlessly resulting in elevated privileges and system compromise.

CVE-2025-27038 carries a CVSS rating of seven.5 and represents a use-after-free vulnerability within the Graphics part. This flaw causes reminiscence corruption throughout graphics rendering by Adreno GPU drivers, particularly throughout the Chrome browser.

The vulnerability might be exploited to bypass browser isolation mechanisms and execute arbitrary code on the goal system.

All three vulnerabilities have been responsibly disclosed to Qualcomm by the Google Android Safety crew. The 2 essential authorization flaws (CVE-2025-21479 and CVE-2025-21480) have been reported in late January 2025, whereas the Chrome-related use-after-free vulnerability (CVE-2025-27038) was communicated in March. This timeline demonstrates the continued nature of safety analysis efforts concentrating on cell GPU drivers.

The vulnerabilities have an effect on Qualcomm’s Adreno GPU framework and might be triggered by specifically crafted command sequences transmitted to the GPU driver. For the Chrome-related vulnerability, attackers can exploit the flaw by malicious internet content material that triggers graphics rendering operations.

Safety researchers notice that these kinds of GPU vulnerabilities are notably helpful to industrial spy ware operators and superior persistent risk teams looking for to escalate privileges on compromised units.

Qualcomm distributed patches for all three vulnerabilities to Authentic Tools Producers (OEMs) in Could 2025, accompanied by robust suggestions for instant deployment.

The corporate emphasizes that gadget producers ought to prioritize these updates, given the energetic exploitation standing. Customers are suggested to contact their gadget producers for particular details about patch availability for his or her units.

The invention highlights ongoing safety challenges in cell GPU drivers, which characterize engaging targets for classy attackers. Business spy ware distributors and state-sponsored risk actors have beforehand weaponized related Qualcomm vulnerabilities.

The speedy disclosure and patching timeline demonstrates improved coordination between safety researchers, chipset producers, and gadget distributors in addressing essential cell safety threats.

Customers ought to guarantee their Android units obtain the most recent safety updates and monitor producer communications relating to patch availability for his or her particular gadget fashions.

Discover this Information Fascinating! Observe us on Google Information, LinkedIn, & X to Get Immediate Updates!

Cyber Security News Tags:0Day, Adreno, Android, Attack, Exploited, GPU, Qualcomm, Users, Vulnerabilities

Post navigation

Previous Post: DSPM vs. DLP : Understanding the Key Differences
Next Post: Future of Passwords Biometrics and Passwordless Authentication

Related Posts

VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited Cyber Security News
macOS Gatekeeper Explained: Strengthening System Defenses Cyber Security News
Endpoint Security Reimagined EDR vs XDR Comparison Cyber Security News
Ivanti Cloud Services Application Vulnerability Leads to Privilege Escalation Cyber Security News
Building a Cyber-Resilient Organization in 2025 Cyber Security News
Critical Open Source Easyjson Library Under Full Control of Russian Company Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News